Follow
Allen D. Householder
Allen D. Householder
CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University
Verified email at cmu.edu - Homepage
Title
Cited by
Cited by
Year
Computer attack trends challenge Internet security
A Householder, K Houle, C Dougherty
Computer 35 (4), sulp5-sulp7, 2002
1962002
CERT advisory CA-2001-26 Nimda worm, September 2001
R Danyliw, C Dougherty, A Householder, R Ruefle
112*
Managing the threat of denial-of-service attacks
A Householder, A Manion, L Pesante, GM Weaver, R Thomas
CERT Coordination Center 10, 2001
105*2001
Computer security incident response team development and evolution
R Ruefle, A Dorofee, D Mundie, AD Householder, M Murray, SJ Perl
IEEE Security & Privacy 12 (5), 16-26, 2014
972014
CERT Advisory CA-2001-19 “Code Red” Worm Exploiting Buffer Overflow In IIS Indexing Service DLL
CC Center
96*2001
The CERT Guide to Coordinated Vulnerability Disclosure.
AD Householder, G Wassermann, A Manion, C King
Software Engineering Institute; Carnegie Mellon University, 2017
772017
A structured approach to classifying security vulnerabilities
RC Seacord, A Householder
Carnegie Mellon University, 2005
76*2005
Probability-based parameter selection for black-box fuzz testing
AD Householder, JM Foote
Software Engineering Institute, Carnegie Mellon University, Tech. Rep. CMU …, 2012
602012
Time to Change the CVSS?
J Spring, E Hatleback, A Householder, A Manion, D Shick
IEEE Security & Privacy 19 (2), 74-78, 2021
412021
Historical analysis of exploit availability timelines
AD Householder, J Chrabaszcz, T Novelly, D Warren, JM Spring
13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020
262020
Securing an internet name server
A Householder, B King, K Silva
CERT Coordination Center Whitepaper, 2002
222002
Towards improving CVSS
J Spring, E Hatleback, A Manion, D Shic
Software Engineering Institute, Carnegie Mellon University, Tech. Rep, 2018
212018
Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)
I Finlay, SV Hernan, JA Rafail, C Dougherty, AD Householder, M Lindner, ...
CERT® Advisory CA-2002-03, Pittsburgh, PA, US, 2002
182002
Another worm exploiting buffer overflow in IIS indexing service DLL
CC Red II
See http://www. cert. org/incident\notes/in-2001-09. html, 2001
18*2001
Prioritizing vulnerability response: A stakeholder-specific vulnerability categorization
JM Spring, E Hatleback, AD Householder, A Manion, D Shick
Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA …, 2019
17*2019
CERT® Advisory CA-2002-27 Apache/mod_ssl Worm
CC Center
17*2002
On managing vulnerabilities in AI/ML systems
JM Spring, A Galyardt, AD Householder, N VanHoudnos
Proceedings of the New Security Paradigms Workshop 2020, 111-126, 2020
152020
Extending AADL for security design assurance of cyber-physical systems
R Ellison, A Householder, J Hudak, R Kazman, C Woody
CMU/SEI Report, 2015
132015
Increased activity targeting Windows shares
A Householder, R Danyliw
CERT Advisory CA-2003-08 11, 2003
13*2003
22 W32/Sircam Malicious Code
CA CA
CERT Cordination Center, URL: http://www. cert. org/advisories/CA-2001-22. html, 2001
12*2001
The system can't perform the operation now. Try again later.
Articles 1–20