Glossary of Terms2018-06-13T18:30:36+00:00
AppMap™2018-06-04T04:59:25+00:00

Virsec’s Trusted Execution precisely maps the known and predictable activity of an application, creating an AppMap™. When the application runs, Virsec monitors all system, file, and
memory activity and proactively takes action if the application deviates from its expected activity.

AppSensor2018-06-04T04:54:34+00:00

AppSensor is an OWASP project that enables you to build self-defending applications with attacker detection and automated response capabilities

AV2018-06-04T04:56:40+00:00

Anti-virus

CLFLUSH2018-06-04T04:44:48+00:00

Cache-line flush – Spectre-related.

CVE2018-06-04T04:19:29+00:00

Common Vulnerabilities and Exposures

DAST2018-06-04T05:00:29+00:00

Dynamic Application Security Testing

DLL injection2018-06-04T05:02:01+00:00

Dynamic Link Library Injection attack. In computer programming, DLL injection is a technique used for running code within the address space of another process by forcing it to load a dynamic-link library. DLL injection is often used by external programs to influence the behavior of another program in a way its authors did not anticipate or intend.

HMI2018-06-04T05:04:21+00:00

Human machine interface.

ICS2018-06-04T05:05:40+00:00

Industrial control system.

IDS2018-06-04T05:07:35+00:00

Intrusion detection system.

IPS2018-06-04T05:06:42+00:00

Intrusion prevention system.

LFENCE2018-06-04T04:29:20+00:00

Load Fence. Spectre-related; a load fence that serializes load operations and halts speculative execution until all instructions up to the fence have been executed.

NGAV2018-06-04T04:33:05+00:00

Next-generation anti-virus

NGFW2018-06-04T04:36:05+00:00

Next-generation firewall

NVD2018-06-04T04:20:30+00:00

National Vulnerability Database

RASP2018-06-04T03:58:16+00:00

Runtime Application Self-Protection

Retpoline2018-06-04T04:18:05+00:00

Spectre-Meltdown-related, Google’s fix for Variant 2 of the Meltdown-Spectre bugs

ROP Gadgets2018-06-04T05:14:13+00:00

Spectre-related – an exploit that uses the victim’s process memory to leak secret information.

SAST2018-06-04T05:15:03+00:00

Static Application Security Testing

SCADA2018-06-04T05:15:56+00:00

Supervisory Control and Data Acquisition

SDLC2018-06-04T05:16:59+00:00

Software Development Life Cycle

STIG2018-06-04T04:30:36+00:00

Security Technical Implementation Guide

TSX-NI2018-06-04T05:18:45+00:00

Transactional Synchronization Extensions New Instructions – an extension to the x86 instruction set architecture (ISA) that adds hardware transactional memory support, speeding up execution of multi-threaded software through lock elision.

WAF2018-06-04T05:19:46+00:00

Web application firewall.

Whitelisting2018-06-04T04:41:23+00:00

Whitelisting: Compiling a list of pre-approved names or entities, such as a list of authentic, spam-free email names or a list of legitimate, malware-free IP addresses.

XSS2018-06-04T05:20:33+00:00

Cross-site Scripting.