Glossary of Terms 2018-06-13T18:30:36+00:00
AppMap™ 2018-06-04T04:59:25+00:00

Virsec’s Trusted Execution precisely maps the known and predictable activity of an application, creating an AppMap™. When the application runs, Virsec monitors all system, file, and
memory activity and proactively takes action if the application deviates from its expected activity.

AppSensor 2018-06-04T04:54:34+00:00

AppSensor is an OWASP project that enables you to build self-defending applications with attacker detection and automated response capabilities

AV 2018-06-04T04:56:40+00:00

Anti-virus

CLFLUSH 2018-06-04T04:44:48+00:00

Cache-line flush – Spectre-related.

CVE 2018-06-04T04:19:29+00:00

Common Vulnerabilities and Exposures

DAST 2018-06-04T05:00:29+00:00

Dynamic Application Security Testing

DLL injection 2018-06-04T05:02:01+00:00

Dynamic Link Library Injection attack. In computer programming, DLL injection is a technique used for running code within the address space of another process by forcing it to load a dynamic-link library. DLL injection is often used by external programs to influence the behavior of another program in a way its authors did not anticipate or intend.

HMI 2018-06-04T05:04:21+00:00

Human machine interface.

ICS 2018-06-04T05:05:40+00:00

Industrial control system.

IDS 2018-06-04T05:07:35+00:00

Intrusion detection system.

IPS 2018-06-04T05:06:42+00:00

Intrusion prevention system.

LFENCE 2018-06-04T04:29:20+00:00

Load Fence. Spectre-related; a load fence that serializes load operations and halts speculative execution until all instructions up to the fence have been executed.

NGAV 2018-06-04T04:33:05+00:00

Next-generation anti-virus

NGFW 2018-06-04T04:36:05+00:00

Next-generation firewall

NVD 2018-06-04T04:20:30+00:00

National Vulnerability Database

RASP 2018-06-04T03:58:16+00:00

Runtime Application Self-Protection

Retpoline 2018-06-04T04:18:05+00:00

Spectre-Meltdown-related, Google’s fix for Variant 2 of the Meltdown-Spectre bugs

ROP Gadgets 2018-06-04T05:14:13+00:00

Spectre-related – an exploit that uses the victim’s process memory to leak secret information.

SAST 2018-06-04T05:15:03+00:00

Static Application Security Testing

SCADA 2018-06-04T05:15:56+00:00

Supervisory Control and Data Acquisition

SDLC 2018-06-04T05:16:59+00:00

Software Development Life Cycle

STIG 2018-06-04T04:30:36+00:00

Security Technical Implementation Guide

TSX-NI 2018-06-04T05:18:45+00:00

Transactional Synchronization Extensions New Instructions – an extension to the x86 instruction set architecture (ISA) that adds hardware transactional memory support, speeding up execution of multi-threaded software through lock elision.

WAF 2018-06-04T05:19:46+00:00

Web application firewall.

Whitelisting 2018-06-04T04:41:23+00:00

Whitelisting: Compiling a list of pre-approved names or entities, such as a list of authentic, spam-free email names or a list of legitimate, malware-free IP addresses.

XSS 2018-06-04T05:20:33+00:00

Cross-site Scripting.