A study and taxonomy of vulnerabilities in web based animation and interactivity software

Download
Author
Post, David M.
Date
2008-12Advisor
Eagle, Chris
Boger, Dan C.
Metadata
Show full item recordAbstract
This thesis attempts to study and categorize vulnerabilities in common software packages. This study results in a proposed taxonomy that will help in protecting vulnerable systems, in order to better enable Computer Network Defense operations. Additionally, this taxonomy will help focus further research in developing exploits aimed at these vulnerabilities, for use in Computer Network Attack and Exploitation operations. Throughout this study, Adobe Flash, a widely used Web browser plug in is used as a case study, due to the many known vulnerabilities and exploits tailored to Adobe Flash that exist.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
DEVELOPMENT TIME OF ZERO-DAY CYBER EXPLOITS IN SUPPORT OF OFFENSIVE CYBER OPERATIONS
Bompos, Konstantinos (Monterey, CA; Naval Postgraduate School, 2020-09);Zero-day vulnerabilities are those that have not previously been identified and thus are in their zeroth day of existence. These vulnerabilities are the most potentially damaging from a cyber defense perspective because ... -
RISK WEIGHTED VULNERABILITY ANALYSIS IN AUTOMATED RED TEAMING
Muse, Audrey C. (Monterey, CA; Naval Postgraduate School, 2022-09);The Cyber Automated Red Team Tool (CARTT) automates red teaming tasks, such as conducting vulnerabilities analysis in DOD networks. The tool provides its users with recommendations to either mitigate cyber threats against ... -
The Enemy’s Access Denial System: Potential Competitor Exploitation of U. S. Military Vulnerabilities.
Harney, Robert C. (Monterey, California: Institute for Joint Warfare Analysis, Naval Postgraduate School, 2000-12); NPS-JW-01-014As part of an experimental approach to “red teaming” that is studying the problem of enemy access denial systems, the author performed a detailed investigation of the vulnerabilities of the U. S. military’s power projection ...