Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Herbert H. Thompson is active.

Publication


Featured researches published by Herbert H. Thompson.


acm symposium on applied computing | 2002

Software security vulnerability testing in hostile environments

Herbert H. Thompson; James A. Whittaker; Florence E. Mottay

Traditional Black box software testing can be effective at exposing some classes of software failures. Security class failures, however, do not tend to manifest readily using these techniques. The problem is that many security failures occur in stressed environments, which appear in the field, but are often neglected during testing because of the difficulty to simulate these conditions. Software can only be considered secure if it behaves securely under all operating environments. Hostile environment testing must thus be a part of any overall testing strategy. This paper describes this necessity and a black box approach for creating such environments in order to expose security vulnerabilities.


Computer Fraud & Security | 2004

Intrusion detection: Perspectives on the insider threat

Herbert H. Thompson; James A. Whittaker

Abstract A recent FBI survey reported that the average cost of a successful attack by a malicious insider is nearly 50 times greater than the cost of an external attack. Further, it is estimated that over 80% of information security incidents for the past four years are the result of insiders. Intrusion detection systems have traditionally targeted those who attack outside of trusted network boundaries. What is desperately needed are mechanisms that monitor insider activity and detect actions at the host level that may be malicious. This paper presents an overview of innovative approaches to detect malicious insiders who operate inside trusted network boundaries.


ACM Queue | 2003

Black Box Debugging

James A. Whittaker; Herbert H. Thompson

Modern software development practices build applications as a collection of collaborating components. Unlike older practices that linked compiled components into a single monolithic application, modern executables are made up of any number of executable components that exist as separate binary files. This design means that as an application component needs resources from another component, calls are made to transfer control or data from one component to another. Thus, we can observe externally visible application behaviors by watching the activity that occurs across the boundaries of the application’s constituent components.


ACM Queue | 2004

Perfect Storm: The Insider, Naivety, and Hostility

Herbert H. Thompson; Richard Ford

Every year corporations and government installations spend millions of dollars fortifying their network infrastructures. Firewalls, intrusion detection systems, and antivirus products stand guard at network boundaries, and individuals monitor countless logs and sensors for even the subtlest hints of network penetration. Vendors and IT managers have focused on keeping the wily hacker outside the network perimeter, but very few technological measures exist to guard against insiders - those entities that operate inside the fortified network boundary. The 2002 CSI/FBI survey estimates that 70 percent of successful attacks come from the inside. Several other estimates place those numbers even higher.


acm symposium on applied computing | 2003

Editorial message: special track on software engineering: applications, practices and tools

Herbert H. Thompson; Chia-Chu Chiang; Ibrahim K. El-Far; Stefan Gruner; Markus Montigel; James A. Whittaker

The Special Track on Software Engineering Software engineering by nature is a broad field that brings together people from various disciplines in computing and beyond. It has a particularly wide appeal as it draws academic and commercial researchers as well as professional engineers. The goal of this special track has always been to solicit high quality submissions that reflect this diversity with an emphasis on novel, practical ideas and useful, practicable results. Authors from around the world responded to our call for papers with several strong submissions, and we are pleased with the papers that have been selected for this year’s track. The authors represented universities, research institutes, and companies from over 10 countries, including the United States, Cyprus, France, China, Italy, Spain, India, Germany, Australia, Greece, Israel, the United Kingdom, Austria, Finland, and Norway. In the end, 40 submissions were made but, after 120 reviews, only 10 papers were ultimately accepted. We briefly introduce these papers below.


Archive | 2004

How to break software security : effective techniques for security testing

James A. Whittaker; Herbert H. Thompson


Archive | 2002

A bayesian model of sequential test allocation for software reliability estimation

Kamel Rekab; James A. Whittaker; Herbert H. Thompson


United States. Office of Naval Research | 2004

Information Centric Security: Innovative Protections to Mitigate the Insider Threat

Herbert H. Thompson; James A. Whittaker


SAC | 2003

Software Engineering Track Editorial.

Herbert H. Thompson; Chia-Chu Chiang; Ibrahim K. El-Far; Stefan Gruner; Markus Montigel; James A. Whittaker


Archive | 2003

ACM SAC'03 Special Track on Software Engineering: Applications, Practices, and Tools

Chia-Chu Chiang; Ibrahim K. El-Far; Stefan Gruner; Markus Montigel; Herbert H. Thompson; James A. Whittaker

Collaboration


Dive into the Herbert H. Thompson's collaboration.

Top Co-Authors

Avatar

James A. Whittaker

Florida Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Chia-Chu Chiang

University of Arkansas at Little Rock

View shared research outputs
Top Co-Authors

Avatar

Ibrahim K. El-Far

Florida Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Markus Montigel

University of New Orleans

View shared research outputs
Top Co-Authors

Avatar

Stefan Gruner

University of Southampton

View shared research outputs
Top Co-Authors

Avatar

Florence E. Mottay

Florida Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kamel Rekab

University of Missouri–Kansas City

View shared research outputs
Top Co-Authors

Avatar

Richard Ford

Florida Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge