A study and taxonomy of vulnerabilities in web based animation and interactivity software
Post, David M.
Boger, Dan C.
MetadataShow full item record
This thesis attempts to study and categorize vulnerabilities in common software packages. This study results in a proposed taxonomy that will help in protecting vulnerable systems, in order to better enable Computer Network Defense operations. Additionally, this taxonomy will help focus further research in developing exploits aimed at these vulnerabilities, for use in Computer Network Attack and Exploitation operations. Throughout this study, Adobe Flash, a widely used Web browser plug in is used as a case study, due to the many known vulnerabilities and exploits tailored to Adobe Flash that exist.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Bompos, Konstantinos (Monterey, CA; Naval Postgraduate School, 2020-09);Zero-day vulnerabilities are those that have not previously been identified and thus are in their zeroth day of existence. These vulnerabilities are the most potentially damaging from a cyber defense perspective because ...
The Enemy’s Access Denial System: Potential Competitor Exploitation of U. S. Military Vulnerabilities. Harney, Robert C. (Monterey, California: Institute for Joint Warfare Analysis, Naval Postgraduate School, 2000-12); NPS-JW-01-014As part of an experimental approach to “red teaming” that is studying the problem of enemy access denial systems, the author performed a detailed investigation of the vulnerabilities of the U. S. military’s power projection ...
Rhodes, Donna H.; Reid, Jack (Monterey, California. Naval Postgraduate School, 2019-04-30); SYM-AM-19-055Digital engineering changes how systems are acquired and developed through the use of model-centric practices and toolsets. Enterprises face new challenges in this transformation, including potential for emergent vulnerabilities ...