The Vulnerabilities Project
Shhhh...
Outline
Project Goals
More Project Goals
History
Getting There From Here
Implications of the Hypothesis
Testing the Hypothesis
DOVES
What DOVES Entries Looks Like
Why SGML?
Other Good Things About SGML
Current Fields: Vulnerabilities
Example Database Entry
Status
Exploits Portion
Attack Tools: Fields
Plans
Intentions
Expected Time Line
Parlez-vous franÁais?
Thesaurus
Formal Methods
Future Work
Pedagogy
Weinbergís Second Law
More Information
Email: bishop@cs.ucdavis.edu
Home Page: http://seclab.cs.ucdavis.edu/~bishop
Other information: This is an overview of the vulnerabilities work I gave at Intel on July 24, 1998.
Download presentation source