메뉴 건너뛰기




Volumn 26, Issue 3, 1994, Pages 211-254

A taxonomy of Computer Program Security Flaws

Author keywords

error defect classification; security flaw; taxonomy

Indexed keywords

CODING ERRORS; COMPUTER SOFTWARE; COMPUTER SYSTEM RECOVERY; DATA HANDLING; SOFTWARE ENGINEERING; STATISTICAL TESTS;

EID: 0028514027     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/185403.185412     Document Type: Article
Times cited : (289)

References (31)
  • 1
    • 0003513832 scopus 로고
    • Security analysis and enhancements of computer operating systems
    • NBSIR 76-1041, National Bureau of Standards, ICST, Washington, D.C
    • ABBOTT, R. P., CHIN, J. S., DONNELLEY, J. E., KONIGSFORD, W. L., TOKUBO, S., AND WEBB, D. A. 1976. Security analysis and enhancements of computer operating systems. NBSIR 76-1041, National Bureau of Standards, ICST, Washington, D.C.
    • (1976)
    • ABBOTT, R.P.1    CHIN, J.S.2    DONNELLEY, J.E.3    KONIGSFORD, W.L.4    TOKUBO, S.5    WEBB, D.A.6
  • 2
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • ESD-TR-73-51, vols. I and II. NTIS AD758206, Hanscom Field, Bedford, Mass
    • ANDERSON, J. P. 1972. Computer security technology planning study. ESD-TR-73-51, vols. I and II. NTIS AD758206, Hanscom Field, Bedford, Mass.
    • (1972)
    • ANDERSON, J.P.1
  • 4
    • 84976703490 scopus 로고
    • Incorporating IEEE Standard 1044 into your anomaly tracking process
    • (Jan.)
    • BREHMER, C. L. AND CARL, J. R. 1993. Incorporating IEEE Standard 1044 into your anomaly tracking process. CrossTalk, J. Def. Softw. Eng. 6, 1 (Jan.), 9-16.
    • (1993) CrossTalk, J. Def. Softw. Eng. , vol.6 , Issue.1 , pp. 9-16
    • BREHMER, C.L.1    CARL, J.R.2
  • 7
    • 84962290765 scopus 로고
    • DoD 5200.28-STD, U.S. Dept. of Defense, Washington, D.C.
    • DEPARTMENT OF DEFENSE. 1985. Trusted computer system evaluation criteria. DoD 5200.28-STD, U.S. Dept. of Defense, Washington, D.C.
    • (1985) Trusted computer system evaluation criteria
  • 9
    • 0013175067 scopus 로고
    • Computer viruses
    • (May-June)
    • DENNING, P. J. 1988. Computer viruses. Am. Sci. 76 (May-June), 236-238.
    • (1988) Am. Sci. , vol.76 , pp. 236-238
    • DENNING, P.J.1
  • 10
    • 0001717425 scopus 로고
    • Invasion of the data snatchers
    • (Sept. 26)
    • ELMER-DEWITT, P. 1988. Invasion of the data snatchers. TIME Mag. (Sept. 26), 62-67.
    • (1988) TIME Mag , pp. 62-67
    • ELMER-DEWITT, P.1
  • 12
    • 0009619753 scopus 로고
    • Software quality measurement: A framework for counting problems and defects
    • CMU/SEI-92-TR-22, Software Engineering Inst. Pittsburgh, Pa
    • FLORAC, W. A. 1992. Software quality measurement: A framework for counting problems and defects. CMU/SEI-92-TR-22, Software Engineering Inst. Pittsburgh, Pa.
    • (1992)
    • FLORAC, W.A.1
  • 15
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • (Oct.)
    • LAMPSON, B. W. 1973. A note on the confinement problem. Commun. ACM 16, 10 (Oct.), 613-615.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • LAMPSON, B.W.1
  • 16
    • 0020780166 scopus 로고
    • The best available technologies for computer security
    • (July)
    • LANDWEHR, C. E. 1983. The best available technologies for computer security. IEEE Comput. 16, 7 (July), 86-100.
    • (1983) IEEE Comput , vol.16 , Issue.7 , pp. 86-100
    • LANDWEHR, C.E.1
  • 17
    • 0019608720 scopus 로고
    • Formal models for computer security
    • (Sept.)
    • LANDWEHR, C. E. 1981. Formal models for computer security. ACM Comput. Surv. 13, 3 (Sept.), 247-278.
    • (1981) ACM Comput. Surv. , vol.13 , Issue.3 , pp. 247-278
    • LANDWEHR, C.E.1
  • 18
    • 0003414571 scopus 로고
    • Springer-Verlag Series in Dependable Computing and Fault-Tolerant Systems, Springer-Verlag, New York
    • LAPRIE, J. C., ED. 1992. Dependability. Basic Concepts and Terminology. Springer-Verlag Series in Dependable Computing and Fault-Tolerant Systems, vol. 6, Springer-Verlag, New York.
    • (1992) Dependability. Basic Concepts and Terminology. , vol.6
    • LAPRIE, J.C.1
  • 19
    • 0842340774 scopus 로고
    • An investigation of the Therac-25 accidents
    • UCI TR-92-108, Information and Computer Science Dept., Univ. of California, Irvine, Ca
    • LEVESON, N. AND TURNER, C. S. 1992. An investigation of the Therac-25 accidents. UCI TR-92-108, Information and Computer Science Dept., Univ. of California, Irvine, Ca.
    • (1992)
    • LEVESON, N.1    TURNER, C.S.2
  • 20
    • 0016600186 scopus 로고
    • Operating system penetration
    • AFIPS, Arlington, Va.
    • LINDE, R. R. 1975. Operating system penetration. In the AFIPS National Computer Conference. AFIPS, Arlington, Va., 361-368.
    • (1975) AFIPS National Computer Conference , pp. 361-368
    • LINDE, R.R.1
  • 21
    • 33846278859 scopus 로고
    • A technique for removing an important class of Trojan horses from high order languages
    • NBS/NCSC, Gaithersburg, Md.
    • MCDERMOTT, J. P. 1988. A technique for removing an important class of Trojan horses from high order languages. In Proceedings of the 11th National Computer Security Conference. NBS/NCSC, Gaithersburg, Md., 114-117.
    • (1988) Proceedings of the 11th National Computer Security Conference , pp. 114-117
    • MCDERMOTT, J.P.1
  • 25
    • 0024684041 scopus 로고
    • With microscope and tweezers: The worm from MIT's perspective
    • (June)
    • ROCHLIS, J. A. AND EICHEN, M W. 1989. With microscope and tweezers: The worm from MIT's perspective. Commun. ACM 32, 6 (June), 689-699.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 689-699
    • ROCHLIS, J.A.1    EICHEN, M.W.2
  • 26
    • 3943108716 scopus 로고
    • Computer security: The Achilles heel of the electronic Air Force?
    • (Jan.-Feb.)
    • SCHELL, R. R. 1979. Computer security: The Achilles heel of the electronic Air Force? Air Univ. Rev. 30, 2 (Jan.-Feb.), 16-33.
    • (1979) Air Univ. Rev. , vol.30 , Issue.2 , pp. 16-33
    • SCHELL, R.R.1
  • 27
    • 84976720856 scopus 로고
    • The “worm” programs-early experience with a distributed computation
    • (Mar.)
    • SCHOCH, J. F. AND HUPP, J. A. 1982. The “worm” programs-early experience with a distributed computation. Commun. ACM 25, 3 (Mar.), 172-180.
    • (1982) Commun. ACM , vol.25 , Issue.3 , pp. 172-180
    • SCHOCH, J.F.1    HUPP, J.A.2
  • 28
    • 0024681099 scopus 로고
    • Crisis and aftermath
    • (June)
    • SPAFFORD, E. H. 1989. Crisis and aftermath. Commun. ACM 32, 6 (June), 678-687.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 678-687
    • SPAFFORD, E.H.1
  • 30
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • (Aug.)
    • THOMPSON, K. 1984. Reflections on trusting trust. Commun. ACM 27, 8 (Aug.), 761-763.
    • (1984) Commun. ACM , vol.27 , Issue.8 , pp. 761-763
    • THOMPSON, K.1
  • 31
    • 0022012701 scopus 로고
    • Evaluating software development by analysis of changes: Some data from the Software Engineering Laboratory
    • (Feb.)
    • WEISS, D. M. AND BASILI, V. R. 1985. Evaluating software development by analysis of changes: Some data from the Software Engineering Laboratory. IEEE Trans. Softw Eng. SE-11, 2 (Feb.), 157-168.
    • (1985) IEEE Trans. Softw Eng. SE-11 , vol.2 , pp. 157-168
    • WEISS, D.M.1    BASILI, V.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.