Vulnerability Pattern

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 138 Experts worldwide ranked by ideXlab platform

Elizabeth R Smith - One of the best experts on this subject based on the ideXlab platform.

  • A watershed-based method for environmental Vulnerability assessment with a case study of the Mid-Atlantic region
    Environmental Impact Assessment Review, 2012
    Co-Authors: Liem T Tran, Robert V. O'neill, Elizabeth R Smith
    Abstract:

    Abstract The paper presents a method for environmental Vulnerability assessment with a case study of the Mid-Atlantic region. The method is based on the concept of “self-/peer-appraisal” of a watershed in term of Vulnerability. The self-/peer-appraisal process is facilitated by two separate linear optimization programs. The analysis provided insights on the environmental conditions, in general, and the relative Vulnerability Pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective and objective way to perform a regional environmental Vulnerability assessment. Consequently the method can be used in various steps in environmental assessment and planning.

  • spatial Pattern of environmental Vulnerability in the mid atlantic region usa
    Applied Geography, 2010
    Co-Authors: Liem T Tran, Robert V Oneill, Elizabeth R Smith
    Abstract:

    Abstract The paper presents a comprehensive analysis to explore the environmental Vulnerability Pattern of the Mid-Atlantic region. It is a combination of several methods – stressor–resource overlay, state-space analysis, and clustering analysis – at different steps of the analysis. In addition, a generalized distance measure was utilized in the state-space analysis to handle the interdependency among variables without reducing their dimensionality. Results from the analysis provided valuable insights on the environmental conditions, in general, and the relative Vulnerability Pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective way to understand the complex spatial Pattern of environmental Vulnerability at regional scale.

  • Spatial Pattern of environmental Vulnerability in the Mid-Atlantic region, USA ☆
    Applied Geography, 2010
    Co-Authors: Liem T Tran, Robert V. O'neill, Elizabeth R Smith
    Abstract:

    Abstract The paper presents a comprehensive analysis to explore the environmental Vulnerability Pattern of the Mid-Atlantic region. It is a combination of several methods – stressor–resource overlay, state-space analysis, and clustering analysis – at different steps of the analysis. In addition, a generalized distance measure was utilized in the state-space analysis to handle the interdependency among variables without reducing their dimensionality. Results from the analysis provided valuable insights on the environmental conditions, in general, and the relative Vulnerability Pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective way to understand the complex spatial Pattern of environmental Vulnerability at regional scale.

Fan Jiang - One of the best experts on this subject based on the ideXlab platform.

  • EUC - PDVDS: A Pattern-Driven Software Vulnerability Detection System
    2010 IEEE IFIP International Conference on Embedded and Ubiquitous Computing, 2010
    Co-Authors: Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang
    Abstract:

    The automatic detection of security vulnerabilities in binary program is challenging and lacks efficient tools. Current research and tools are mostly restricted to a specific platform and environment, which induces the trouble to detect all kinds of vulnerabilities with unified approach. Moreover, Existing methods need many manual operations and rely on the experience of researchers. This paper presents a cross-platform system for automatically software Vulnerability detection based on uniform intermediate representation. It supports many platforms, including x86, PowerPC and ARM. The system lifts underlying instructions to intermediate representation from several platforms. Platform-independent analysis method is implemented based on intermediate representation by static analysis. It also uses a Vulnerability Pattern driver extracted from experience and knowledge to drive the automatic Vulnerability detection during the analysis. The system called PDVDS has been realized. We have evaluated its effectiveness through validating many known vulnerabilities and detecting three zero-day vulnerabilities.

  • PDVDS: A Pattern-Driven Software Vulnerability Detection System
    2010 IEEE IFIP International Conference on Embedded and Ubiquitous Computing, 2010
    Co-Authors: Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang
    Abstract:

    The automatic detection of security vulnerabilities in binary program is challenging and lacks efficient tools. Current research and tools are mostly restricted to a specific platform and environment, which induces the trouble to detect all kinds of vulnerabilities with unified approach. Moreover, Existing methods need many manual operations and rely on the experience of researchers. This paper presents a cross-platform system for automatically software Vulnerability detection based on uniform intermediate representation. It supports many platforms, including x86, PowerPC and ARM. The system lifts underlying instructions to intermediate representation from several platforms. Platform-independent analysis method is implemented based on intermediate representation by static analysis. It also uses a Vulnerability Pattern driver extracted from experience and knowledge to drive the automatic Vulnerability detection during the analysis. The system called PDVDS has been realized. We have evaluated its effectiveness through validating many known vulnerabilities and detecting three zero-day vulnerabilities.

Liem T Tran - One of the best experts on this subject based on the ideXlab platform.

  • A watershed-based method for environmental Vulnerability assessment with a case study of the Mid-Atlantic region
    Environmental Impact Assessment Review, 2012
    Co-Authors: Liem T Tran, Robert V. O'neill, Elizabeth R Smith
    Abstract:

    Abstract The paper presents a method for environmental Vulnerability assessment with a case study of the Mid-Atlantic region. The method is based on the concept of “self-/peer-appraisal” of a watershed in term of Vulnerability. The self-/peer-appraisal process is facilitated by two separate linear optimization programs. The analysis provided insights on the environmental conditions, in general, and the relative Vulnerability Pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective and objective way to perform a regional environmental Vulnerability assessment. Consequently the method can be used in various steps in environmental assessment and planning.

  • spatial Pattern of environmental Vulnerability in the mid atlantic region usa
    Applied Geography, 2010
    Co-Authors: Liem T Tran, Robert V Oneill, Elizabeth R Smith
    Abstract:

    Abstract The paper presents a comprehensive analysis to explore the environmental Vulnerability Pattern of the Mid-Atlantic region. It is a combination of several methods – stressor–resource overlay, state-space analysis, and clustering analysis – at different steps of the analysis. In addition, a generalized distance measure was utilized in the state-space analysis to handle the interdependency among variables without reducing their dimensionality. Results from the analysis provided valuable insights on the environmental conditions, in general, and the relative Vulnerability Pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective way to understand the complex spatial Pattern of environmental Vulnerability at regional scale.

  • Spatial Pattern of environmental Vulnerability in the Mid-Atlantic region, USA ☆
    Applied Geography, 2010
    Co-Authors: Liem T Tran, Robert V. O'neill, Elizabeth R Smith
    Abstract:

    Abstract The paper presents a comprehensive analysis to explore the environmental Vulnerability Pattern of the Mid-Atlantic region. It is a combination of several methods – stressor–resource overlay, state-space analysis, and clustering analysis – at different steps of the analysis. In addition, a generalized distance measure was utilized in the state-space analysis to handle the interdependency among variables without reducing their dimensionality. Results from the analysis provided valuable insights on the environmental conditions, in general, and the relative Vulnerability Pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective way to understand the complex spatial Pattern of environmental Vulnerability at regional scale.

Shaoyin Cheng - One of the best experts on this subject based on the ideXlab platform.

  • EUC - PDVDS: A Pattern-Driven Software Vulnerability Detection System
    2010 IEEE IFIP International Conference on Embedded and Ubiquitous Computing, 2010
    Co-Authors: Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang
    Abstract:

    The automatic detection of security vulnerabilities in binary program is challenging and lacks efficient tools. Current research and tools are mostly restricted to a specific platform and environment, which induces the trouble to detect all kinds of vulnerabilities with unified approach. Moreover, Existing methods need many manual operations and rely on the experience of researchers. This paper presents a cross-platform system for automatically software Vulnerability detection based on uniform intermediate representation. It supports many platforms, including x86, PowerPC and ARM. The system lifts underlying instructions to intermediate representation from several platforms. Platform-independent analysis method is implemented based on intermediate representation by static analysis. It also uses a Vulnerability Pattern driver extracted from experience and knowledge to drive the automatic Vulnerability detection during the analysis. The system called PDVDS has been realized. We have evaluated its effectiveness through validating many known vulnerabilities and detecting three zero-day vulnerabilities.

  • PDVDS: A Pattern-Driven Software Vulnerability Detection System
    2010 IEEE IFIP International Conference on Embedded and Ubiquitous Computing, 2010
    Co-Authors: Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang
    Abstract:

    The automatic detection of security vulnerabilities in binary program is challenging and lacks efficient tools. Current research and tools are mostly restricted to a specific platform and environment, which induces the trouble to detect all kinds of vulnerabilities with unified approach. Moreover, Existing methods need many manual operations and rely on the experience of researchers. This paper presents a cross-platform system for automatically software Vulnerability detection based on uniform intermediate representation. It supports many platforms, including x86, PowerPC and ARM. The system lifts underlying instructions to intermediate representation from several platforms. Platform-independent analysis method is implemented based on intermediate representation by static analysis. It also uses a Vulnerability Pattern driver extracted from experience and knowledge to drive the automatic Vulnerability detection during the analysis. The system called PDVDS has been realized. We have evaluated its effectiveness through validating many known vulnerabilities and detecting three zero-day vulnerabilities.

Soonjwa Hong - One of the best experts on this subject based on the ideXlab platform.

  • a model for security Vulnerability Pattern
    International Conference on Computational Science and Its Applications, 2006
    Co-Authors: Hyungwoo Kang, Soonjwa Hong
    Abstract:

    Static analysis technology is used to find programming errors before run time. Unlike dynamic analysis technique which looks at the application state while it is being executed, static analysis technique does not require the application to be executed. In this paper, we classify security Vulnerability Patterns in source code and design a model to express various security Vulnerability Patterns by making use of pushdown automata. On the basis of the model, it is possible to find a security Vulnerability by making use of Abstract Syntax Tree (AST) based Pattern matching technique in parsing level.

  • ICCSA (3) - A model for security Vulnerability Pattern
    Computational Science and Its Applications - ICCSA 2006, 2006
    Co-Authors: Hyungwoo Kang, Soonjwa Hong
    Abstract:

    Static analysis technology is used to find programming errors before run time. Unlike dynamic analysis technique which looks at the application state while it is being executed, static analysis technique does not require the application to be executed. In this paper, we classify security Vulnerability Patterns in source code and design a model to express various security Vulnerability Patterns by making use of pushdown automata. On the basis of the model, it is possible to find a security Vulnerability by making use of Abstract Syntax Tree (AST) based Pattern matching technique in parsing level.