Attack surface definitions: A systematic literature review

C Theisen, N Munaiah, M Al-Zyoud, JC Carver… - Information and …, 2018 - Elsevier
… Based on our analysis, we recommend practitioners choose a definition of attack surface
appropriate for their domain based on the six themes we identified in our study. …

A connected and autonomous vehicle reference architecture for attack surface analysis

C Maple, M Bradbury, AT Le, K Ghirardello - Applied Sciences, 2019 - mdpi.com
… To demonstrate the effectiveness of using this reference architecture to perform attack
surface analysis, we instantiate it with two different case studies. Using the interactions of …

An attack surface metric

PK Manadhata, JM Wing - IEEE Transactions on Software …, 2010 - ieeexplore.ieee.org
… Not all resources, however, are part of the attack surface and not all resources … the attack
surface. A resource is part of the attack surface if an attacker can use the resource to attack the …

Cyber security of smart homes: Development of a reference architecture for attack surface analysis

K Ghirardello, C Maple, D Ng… - Living in the Internet of …, 2018 - ieeexplore.ieee.org
… Furthermore, this document demonstrates how the architecture can be used to determine
the various attack surfaces of a home automation system from which its key vulnerabilities can …

Attack surface analysis of permissioned blockchain platforms for smart cities

A Davenport, S Shetty, X Liang - 2018 IEEE International Smart …, 2018 - ieeexplore.ieee.org
… Abstract—In this paper, we explore the attack surfaces in open source permissioned
blockchain project Hyperledger Fabric that can be exploited and compromised through …

[图书][B] Measuring a system's attack surface

P Manadhata, JM Wing - 2004 - reports-archive.adm.cs.cmu.edu
attack than resources in an attack class with a low payoff value. We outline a method to identify
attack classes and to measure a system’s attack surface. … the relative attack surface of four …

[PDF][PDF] Attack surface analysis of Blackberry devices

J O'Connor - White Paper: Symantec security response, 2007 - Citeseer
… This document will present an attack surface analysis of the BlackBerry device; this analysis
will include a high-level review of architecture and related application attack scenarios. This …

[PDF][PDF] Windows Vista network attack surface analysis: A broad overview

T Newsham, J Hoagland - Symantec Response whitepaper, July, 2006 - Citeseer
… were most likely to come under attack. We performed our analysis on the public beta builds
… The remainder of this paper will detail our analysis of the Windows Vista network stack. The …

Spoke: Scalable knowledge collection and attack surface analysis of access control policy for security enhanced android

R Wang, AM Azab, W Enck, N Li, P Ning… - Proceedings of the …, 2017 - dl.acm.org
… characterizing the attack surface of SEAndroid policy rules. Our attack surface analysis is
achieved … Hence, we design an attack surface analysis to pinpoint such over-permissive access …

Ims threat and attack surface analysis using common vulnerability scoring system

S Petajasoja, H Kortti, A Takanen… - 2011 IEEE 35th annual …, 2011 - ieeexplore.ieee.org
attack surface analysis methodology. These findings were verified and augmented by active
scanning and passive analysis of … interactions and transient attack surfaces. After the IMS …