August 26, 2014

Vulnerability Analysis: Essential Design Principles

By making use of rarely used protocol properties in unusual combinations, an attacker may make it difficult for information security systems to detect an attack. Obfuscation techniques are collectively known as evasion techniques, and these rely on underlying principles. This paper is written by Olli-Pekka Niemi who heads up the Vulnerability Analysis Group at McAfee; it outlines key principles to identify potential threats and offers advice on how to protect against them.

  • Download Paper
  • More resources from McAfee

  • Leave a comment

    Search Webtorials

    Get E-News and Notices via Email




    I accept Webtorials' Terms and Conditions.

    Trending Discussions

    See more discussions...

    Featured Sponsor Microsites



    Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

    Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.