The Vulnerabilities Project

7/28/98


Click here to start


Table of Contents

The Vulnerabilities Project

Shhhh...

Outline

Project Goals

More Project Goals

History

Getting There From Here

Implications of the Hypothesis

Testing the Hypothesis

DOVES

What DOVES Entries Looks Like

Why SGML?

Other Good Things About SGML

Current Fields: Vulnerabilities

Example Database Entry

Example Database Entry

Status

Exploits Portion

Attack Tools: Fields

Status

Plans

Intentions

Expected Time Line

Parlez-vous franÁais?

Thesaurus

Formal Methods

Future Work

Pedagogy

Weinbergís Second Law

More Information

Author: Matt Bishop

Email: bishop@cs.ucdavis.edu

Home Page: http://seclab.cs.ucdavis.edu/~bishop

Other information:
This is an overview of the vulnerabilities work I gave at Intel on July 24, 1998.

Download presentation source