Download now Free registration required
The vulnerability problem is discovered by presenting an attack injection methodology in software components. The attack injection methodology, implemented follows an approach similar to hackers and security analysts to discover vulnerabilities in network-connected servers. AJECT uses a specification of the server's communication protocol and predefined test case generation algorithms to automatically create a large number of attacks. The attack injection methodology is used for vulnerability detection and removal. It mimics the behavior of an adversary by injecting attacks against a target system while inspecting its execution to determine if any of the attacks has caused a failure.
- Format: PDF
- Size: 228.3 KB