Automated Detection of Vulnerabilities in Black-Box Routers and Other Network Devices

Automated Detection of Vulnerabilities in Black-Box Routers and Other Network Devices

Black Hat via YouTube Direct link

INTRODUCTION-GABI NAKIBLY

2 of 20

2 of 20

INTRODUCTION-GABI NAKIBLY

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Automated Detection of Vulnerabilities in Black-Box Routers and Other Network Devices

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 INTRODUCTION-GABI NAKIBLY
  3. 3 OUTLINE
  4. 4 RESEARCH GOAL
  5. 5 OURMETHOD IN A GLANCE
  6. 6 CREATE A MODEL OF A PROTOCOL
  7. 7 SYMBOLIC EXECUTION 101
  8. 8 GENERATE TEST CASES
  9. 9 EXECUTE TESTS
  10. 10 FIND DEVIATIONS
  11. 11 PATH EXPLOSION PROBLEM
  12. 12 OUR MAIN OPTIMIZATION
  13. 13 OSPF ANALYSIS
  14. 14 THE FIGHT-BACK MECHANISM
  15. 15 THE ATTACKER
  16. 16 OSPF MODEL
  17. 17 CISCO TESTBED
  18. 18 CISCO RESULTS
  19. 19 QUAGGA
  20. 20 IN SUMMARY

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.