Proceedings of the 2nd ACM Workshop on Quality of Protection 2006
DOI: 10.1145/1179494.1179497
|View full text |Cite
|
Sign up to set email alerts
|

Measuring the attack surfaces of two FTP daemons

Abstract: Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system administrators, care about and will use in choosing one software system over another. An attack surface metric is a security metric for comparing the relative security of similar software systems [7]. The measure of a system's attack surface is an indicator of the system's security: given two systems, we compare their attack surface measurem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(42 citation statements)
references
References 5 publications
0
42
0
Order By: Relevance
“…The main idea behind classifying system resources is based on the notion that some of them are more likely to be attacked than others. After identifying and classifying all attackable system resources, they presented, measured and compared the attack surface of two Linux distributions, two IMAP servers [20,21,23] and two FTP Daemons [18,20,23].…”
Section: Related Workmentioning
confidence: 99%
“…The main idea behind classifying system resources is based on the notion that some of them are more likely to be attacked than others. After identifying and classifying all attackable system resources, they presented, measured and compared the attack surface of two Linux distributions, two IMAP servers [20,21,23] and two FTP Daemons [18,20,23].…”
Section: Related Workmentioning
confidence: 99%
“…Another approach measures the relative risk of different configurations using the weakest attacker model, that is the least conditions under which an attack is possible [20]. Yet another series of work measures how likely a software is vulnerable to attacks using a metrics called attack surface [10,12,17,18,19]. These work allow a partial order to be established on different network configurations based on their relative security.…”
Section: Related Workmentioning
confidence: 99%
“…Another series of work compares software for their relative vulnerabilities to attacks using a fixed set of dimensions, namely, attack surface [11,20,13]. The work by Mehta et.…”
Section: Related Workmentioning
confidence: 99%