Vulnerability Development mailing list archives
Re: Techniques for Vulneability discovery
From: "Ivan Arce" <ivan.arce () corest com>
Date: Fri, 5 Apr 2002 19:01:04 -0300
Hi, I just got an article on that very topic published in April's IEEE Computer Magazine (they published a supplement on Security and Privacy as the first output of the newly created IEEE Security and Privacy Task Force) The online version is at: http://www.corest.com/publications/IEEE.htm or http://www.computer.org/computer/sp/articles/arc/index.htm I will welcome your comments, thanks -ivan -- Ivan Arce CTO CORE SECURITY TECHNOLOGIES 44 Wall Street - New York, NY 10005 Ph: (212) 461-2345 Fax: (212) 461-2346 http://www.corest.com PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836 B25D 207B E78E 2AD1 F65A
Current thread:
- Re: RE: Techniques for Vulneability discovery, (continued)
- Re: RE: Techniques for Vulneability discovery LS (Apr 08)
- RE: Techniques for Vulneability discovery Marc Maiffret (Apr 05)
- Re: Techniques for Vulneability discovery NoCoNFLiC (Apr 05)
- Re: Techniques for Vulneability discovery 3APA3A (Apr 06)
- Re: Techniques for Vulneability discovery Rafael Anschau (Apr 09)
- Re: Techniques for Vulneability discovery GomoR (Apr 09)
- RE: Techniques for Vulneability discovery David Hawley (Apr 10)
- RE: Techniques for Vulneability discovery Ed Moyle (Apr 05)
- RE: Techniques for Vulneability discovery W. Lee Schexnaider (Apr 05)
- RE: Techniques for Vulneability discovery John Daniele (Apr 07)
- Re: Techniques for Vulneability discovery Ivan Arce (Apr 05)
- RE: Techniques for Vulneability discovery Guillermo Marro (Apr 05)