Show simple item record

dc.contributor.advisorFord, Richard
dc.contributor.advisorAllen, William
dc.contributor.authorNagy, Lajos
dc.contributor.authorFord, Richard
dc.contributor.authorAllen, William
dc.date.accessioned2013-11-14T18:32:24Z
dc.date.available2013-11-14T18:32:24Z
dc.date.issued2006-02-04
dc.identifier.citationNagy, L., Ford, R., Allen, W. (2006). N-version programming for the detection of zero-day exploits (CS-2006-04). Melbourne, FL. Florida Institute of Technology.en_US
dc.identifier.otherCS-2006-04
dc.identifier.urihttp://hdl.handle.net/11141/167
dc.description.abstractUsing N-Version programming techniques to increase software reliability is a well-explored field. In this paper, we extend the concept to the detection of new security vulnerabilities. Using our own N-Version arbiter, Judicare, we implement a simple auction web application, and demonstrate how our application is robust to the most common Web vulnerabilities as documented by OWASP. Finally, we discuss the implications of our results in the context of detection of Zero-Day attacks.en_US
dc.language.isoen_USen_US
dc.rightsCopyright held by authors.en_US
dc.titleN-Version programming for the detection of zero-day exploitsen_US
dc.typeTechnical Reporten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record