메뉴 건너뛰기




Volumn 37, Issue , 2004, Pages 4405-4414

Can source code auditing software identify common vulnerabilities and Be used to evaluate software security?

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER SYSTEM FIREWALLS; ENCODING (SYMBOLS); QUALITY CONTROL; RISK ASSESSMENT; STANDARDS; STATISTICAL METHODS;

EID: 12344279827     PISSN: 10603425     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/hicss.2004.1265654     Document Type: Conference Paper
Times cited : (29)

References (30)
  • 2
    • 84860075206 scopus 로고    scopus 로고
    • Static Analysis http://www.ics.uci.edu/~djr/classes/ics224/lectures/08- StaticAnalysis.pdf
    • Static Analysis
  • 3
    • 84860079623 scopus 로고    scopus 로고
    • CS 390S
    • CS 390S - Code Injection and Symlinks http://www.cs.purdue.edu/homes/ cs390s/LectureNotes/cs390sIV.pdf
    • Code Injection and Symlinks
  • 5
    • 84860082807 scopus 로고    scopus 로고
    • Sardonix Security Portal, http://www.sardonix.org/
  • 8
    • 84860090526 scopus 로고    scopus 로고
    • CS 390S
    • CS 390S - Buffer Overflows http://www.cs.purdue.edu/homes/cs390s/ LectureNotes/cs390sBO.pdf
    • Buffer Overflows
  • 9
    • 84860075150 scopus 로고    scopus 로고
    • Cqual README file http://www.cs.berkeley.edu/~jfoster/equal/
    • Cqual README File
  • 10
  • 25
    • 84860081349 scopus 로고    scopus 로고
    • Computer Security Institute. http://www.gocsi.com/press/20020407.html
  • 26
    • 84860084941 scopus 로고    scopus 로고
    • ICAT statistics. http://icat.nist.gov/icat.cfm?function=statistics
    • ICAT Statistics


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.