Protocol Vulnerabilities in Practice: Causes, Modeling and Automatic Detection

Provided by: Politecnico di Torino
Topic: Security
Format: PDF
Starting from practical scenarios the authors underline that the most relevant security vulnerabilities in practice come from weak protocol design or implementation flaws rather than from weak or flawed cryptography. In particular, they outline security vulnerabilities in several kinds of scenarios starting from well explored fields such as computer networks to less explored ones from the automotive industry and control systems. Some of the security flaws that they discuss are already known while others are new and have been subject of their previous research.

Find By Topic