By William Casey on April 4, 2016 9:00 AM| No Comments
In cyber systems, the identities of devices can easily be spoofed and are frequent targets of cyber-attacks. Once an identity is fabricated, stolen or spoofed it may be used as a nexus to systems, thus forming a Sybil Attack. To...
By William Casey on February 3, 2014 4:15 PM| No Comments
Code clones are implementation patterns transferred from program to program via copy mechanisms including cut-and-paste, copy-and-paste, and code-reuse. As a software engineering practice there has been significant debate about the value of code cloning. In its most basic form, code...
By William Casey on September 23, 2013 3:36 PM| No Comments
Exclusively technical approaches toward attaining cyber security have created pressures for malware attackers to evolve technical sophistication and harden attacks with increased precision, including socially engineered malware and distributed denial of service (DDoS) attacks. A general and simple design for...
By William Casey on January 9, 2012 3:59 PM| No Comments
Through our work in cyber security, we have amassed millions of pieces of malicious software in a large malware database called the CERT Artifact Catalog. Analyzing this code manually for potential similarities and to identify malware provenance is a painstaking...
By William Casey on March 21, 2011 4:59 PM| No Comments
Malicious software (known as "malware") is increasingly pervasive with a constant influx of new, increasingly complex strains that wreak havoc by exploiting computers or personal and business information stored therein for malicious or criminal purposes. Examples include code that is...
Visit the SEI Digital Library for other publications by William
Toll Free: 888-201-4479
4500 Fifth Avenue
Pittsburgh, PA 15213-2612