Академический Документы
Профессиональный Документы
Культура Документы
include the MITRE common vulnerabilities and exposures (CVE) and CVE
candidates (CAN) databases [22], X-Force
archives [23], bugtraq archives [24], and others [25], [26], [27]. We construct
three matrices that offer different perspectives
our firewall data flow model) with vulnerability causes. We simply insert each
vulnerability tag/name in the matrix cell
that corresponds to its classification by cause and its location in our data flow
model. We will use this matrix to develop
an intuition about which errors a firewall operation is most vulnerable to. For
example, we find that the legality checks