Insecure default values in software settings can be exploited by attackers to compromise the system that runs the software. As a countermeasure, there exist security-configuration guides specifying in detail which values are secure. However, most administrators still refrain from hardening existing systems because the system functionality is feared to deteriorate if secure settings are applied. To foster the application of security-configuration guides, it is necessary to identify those rules that would restrict the functionality. This article presents our approach to use combinatorial testing to find problematic combinations of rules and machine learning techniques to identify the problematic rules within these combinations. The administ...
As the world continues to embrace a completely digital society in all aspects of life, the ever pres...
This research examines how software specifications could be used to build more-secure software. For ...
Nowadays, security incidents have become a familiar “nuisance,” and they regularly lead to the expos...
Security Hardening is the process of configuring IT systems to ensure the security of the systems' c...
With the rise of mobile devices such as smart phones and IoTs and emerging new application areas suc...
To secure computer infrastructure, we need to configure all security-relevant settings. We need secu...
Context: Security is a growing concern in many organizations. Industries developing software systems...
The security of nowadays IT services significantly depends on the correct configuration of increasin...
Due to the growing complexity and scale of IT systems, there is an increasing need to automate and s...
A configuration management system (CMS) can control large networks of computers. A modern CMS is ide...
Software systems tend to become more and more configurable to satisfy the demands of their increasin...
Hardening is the process of configuring IT systems to ensure the security of the systems' components...
Computer-based systems have solved several domain problems, including industrial, military, educatio...
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., partic...
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., partic...
As the world continues to embrace a completely digital society in all aspects of life, the ever pres...
This research examines how software specifications could be used to build more-secure software. For ...
Nowadays, security incidents have become a familiar “nuisance,” and they regularly lead to the expos...
Security Hardening is the process of configuring IT systems to ensure the security of the systems' c...
With the rise of mobile devices such as smart phones and IoTs and emerging new application areas suc...
To secure computer infrastructure, we need to configure all security-relevant settings. We need secu...
Context: Security is a growing concern in many organizations. Industries developing software systems...
The security of nowadays IT services significantly depends on the correct configuration of increasin...
Due to the growing complexity and scale of IT systems, there is an increasing need to automate and s...
A configuration management system (CMS) can control large networks of computers. A modern CMS is ide...
Software systems tend to become more and more configurable to satisfy the demands of their increasin...
Hardening is the process of configuring IT systems to ensure the security of the systems' components...
Computer-based systems have solved several domain problems, including industrial, military, educatio...
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., partic...
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., partic...
As the world continues to embrace a completely digital society in all aspects of life, the ever pres...
This research examines how software specifications could be used to build more-secure software. For ...
Nowadays, security incidents have become a familiar “nuisance,” and they regularly lead to the expos...