Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
Offered By: IEEE via YouTube
Course Description
Overview
Learn about an innovative approach to network security in this 18-minute IEEE conference talk. Explore how researchers from Purdue University and Northeastern University are developing automated attack synthesis techniques by extracting finite state machines from protocol specification documents. Discover the potential implications of this method for identifying vulnerabilities in network protocols and enhancing overall cybersecurity measures.
Syllabus
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network