By making use of rarely used protocol properties in unusual combinations, an attacker may make it difficult for information security systems to detect an attack. Obfuscation techniques are collectively known as evasion techniques, and these rely on underlying principles. This paper is written by Olli-Pekka Niemi who heads up the Vulnerability Analysis Group at McAfee; it outlines key principles to identify potential threats and offers advice on how to protect against them.
August 26, 2014
Download Paper More resources from McAfee
Tweet Follow @webtorials
Vulnerability Analysis: Essential Design Principles
Tweet Follow @webtorials
Leave a comment