{"id":"https://openalex.org/W2152962213","doi":"https://doi.org/10.1109/prdc.2004.1276595","title":"Ferret: a host vulnerability checking tool","display_name":"Ferret: a host vulnerability checking tool","publication_year":2004,"publication_date":"2004-06-10","ids":{"openalex":"https://openalex.org/W2152962213","doi":"https://doi.org/10.1109/prdc.2004.1276595","mag":"2152962213"},"language":"en","primary_location":{"id":"doi:10.1109/prdc.2004.1276595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/prdc.2004.1276595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101971219","display_name":"Anil Sharma","orcid":"https://orcid.org/0000-0002-7115-6278"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"A. Sharma","raw_affiliation_strings":["Center for Reliability Engineering, Department of Mechanical Engineering, University of Maryland College Park, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"Center for Reliability Engineering, Department of Mechanical Engineering, University of Maryland College Park, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063418108","display_name":"Jamilyn Martin","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J.R. Martin","raw_affiliation_strings":["Coordinated Science Laboratory, Department of Electrical & Computer Engineering, University of Illinois, Urbana-Champaign, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"Coordinated Science Laboratory, Department of Electrical & Computer Engineering, University of Illinois, Urbana-Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101808189","display_name":"Niharika Anand","orcid":"https://orcid.org/0000-0003-2939-1298"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"N. Anand","raw_affiliation_strings":["Center for Reliability Engineering, Department of Mechanical Engineering, University of Maryland College Park, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"Center for Reliability Engineering, Department of Mechanical Engineering, University of Maryland College Park, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050380937","display_name":"Michel Cukier","orcid":"https://orcid.org/0000-0001-6250-4632"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Cukier","raw_affiliation_strings":["Center for Reliability Engineering, Department of Mechanical Engineering, University of Maryland College Park, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"Center for Reliability Engineering, Department of Mechanical Engineering, University of Maryland College Park, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074285069","display_name":"William H. Sanders","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"W.H. Sanders","raw_affiliation_strings":["Coordinated Science Laboratory, Department of Electrical & Computer Engineering, University of Illinois, Urbana-Champaign, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"Coordinated Science Laboratory, Department of Electrical & Computer Engineering, University of Illinois, Urbana-Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101971219"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":1.8485,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.88278179,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"389","last_page":"394"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.821727454662323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7911583185195923},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.7006468176841736},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.6960468888282776},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6538898348808289},{"id":"https://openalex.org/keywords/extensibility","display_name":"Extensibility","score":0.597771167755127},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.5965272188186646},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5332801938056946},{"id":"https://openalex.org/keywords/perl","display_name":"Perl","score":0.5055286884307861},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.3895376920700073},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.35610830783843994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3514575660228729},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2937840521335602},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1591792106628418}],"concepts":[{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.821727454662323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7911583185195923},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.7006468176841736},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.6960468888282776},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6538898348808289},{"id":"https://openalex.org/C32833848","wikidata":"https://www.wikidata.org/wiki/Q4115054","display_name":"Extensibility","level":2,"score":0.597771167755127},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.5965272188186646},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5332801938056946},{"id":"https://openalex.org/C2777002779","wikidata":"https://www.wikidata.org/wiki/Q42478","display_name":"Perl","level":2,"score":0.5055286884307861},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3895376920700073},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.35610830783843994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3514575660228729},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2937840521335602},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1591792106628418},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/prdc.2004.1276595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/prdc.2004.1276595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.9.7309","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.7309","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.crhc.uiuc.edu/PERFORM/Papers/USAN_papers/03SHA01.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W158941145","https://openalex.org/W190850219","https://openalex.org/W1483652549","https://openalex.org/W1485958959","https://openalex.org/W1554941375","https://openalex.org/W1989449504","https://openalex.org/W2137978003","https://openalex.org/W2139102556","https://openalex.org/W2141289698","https://openalex.org/W2141867896","https://openalex.org/W2143049370","https://openalex.org/W2152473397","https://openalex.org/W2170590256","https://openalex.org/W2271264781","https://openalex.org/W6606432014","https://openalex.org/W6607701776","https://openalex.org/W6628684157","https://openalex.org/W6680947379","https://openalex.org/W6996787643"],"related_works":["https://openalex.org/W3022321974","https://openalex.org/W2141388993","https://openalex.org/W2779307146","https://openalex.org/W2129419898","https://openalex.org/W1978034799","https://openalex.org/W2999607548","https://openalex.org/W2956597637","https://openalex.org/W2044639210","https://openalex.org/W2293245356","https://openalex.org/W4225160120"],"abstract_inverted_index":{"Evaluation":[0],"of":[1,7,15,106,126],"computing":[2],"system":[3,13,50],"security":[4],"requires":[5],"knowledge":[6],"the":[8,12,19,115],"vulnerabilities":[9,55,110],"present":[10,58],"in":[11,67,144],"and":[14,65,81,98],"potential":[16],"attacks":[17],"against":[18],"system.":[20],"Vulnerabilities":[21],"can":[22,99],"be":[23,101],"classified":[24],"based":[25],"on":[26,59],"their":[27],"location":[28],"as":[29,111],"application":[30],"vulnerabilities,":[31,33],"network":[32],"or":[34,133],"host":[35,46],"vulnerabilities.":[36,47],"We":[37],"describe":[38],"Ferret,":[39],"a":[40,60,68,71,89,93,138],"new":[41,109],"software":[42,142],"tool":[43],"for":[44,77,108],"checking":[45],"Ferret":[48,95,127,136],"helps":[49],"administrators":[51],"by":[52,88],"quickly":[53],"finding":[54],"that":[56],"are":[57,113],"host.":[61],"It":[62],"is":[63,75,86,96,137],"designed":[64],"implemented":[66,143],"modular":[69,116],"way:":[70],"different":[72],"plug-in":[73,90],"module":[74],"used":[76],"each":[78,82],"vulnerability":[79],"checked,":[80],"possible":[83],"output":[84],"format":[85],"specified":[87],"module.":[91],"As":[92],"result,":[94],"extensible,":[97],"easily":[100],"kept":[102],"up-to-date":[103],"through":[104],"addition":[105],"checks":[107],"they":[112],"discovered;":[114],"approach":[117],"also":[118],"makes":[119],"it":[120],"easy":[121],"to":[122,129],"provide":[123],"specific":[124,130],"configurations":[125],"tailored":[128],"operating":[131],"systems":[132],"use":[134],"environments.":[135],"freely":[139],"available":[140],"open-source":[141],"Perl.":[145]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
