메뉴 건너뛰기




Volumn 8, Issue 4, 2003, Pages 34-44

An historical perspective of software vulnerability management

Author keywords

[No Author keywords available]

Indexed keywords

C (PROGRAMMING LANGUAGE); COMPUTER NETWORKS; COMPUTER PROGRAMMING; INFORMATION MANAGEMENT; LARGE SCALE SYSTEMS; NONLINEAR SYSTEMS; SEMANTICS; SOFTWARE ENGINEERING;

EID: 1942473600     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1363-4127(03)00005-0     Document Type: Article
Times cited : (4)

References (31)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One, November 1996. Avaliable from
    • Aleph One. Smashing the stack for fun and profit. Phrack 49, 14, November 1996. Avaliable from http://www.phrack.com.
    • Phrack , vol.49 , pp. 14
  • 2
    • 0003400251 scopus 로고
    • Secure Computer Systems: Unified Exposition & Multics Interpretation
    • MITRE Corp, July 1975
    • D. Bell and L. LaPadula, 1975. Secure Computer Systems: Unified Exposition & Multics Interpretation, Technical Report MTIS AD-A023588, MITRE Corp, July 1975.
    • (1975) Technical Report , vol.MTIS AD-A023588
    • Bell, D.1    LaPadula, L.2
  • 3
  • 4
    • 0003411763 scopus 로고
    • A Taxonomy of UNIX System and Network Vulnerabilities
    • Department of Computer Science, University of California at Davis, May 1995
    • M. Bishop, 1995. A Taxonomy of UNIX System and Network Vulnerabilities, Technical Report, Department of Computer Science, University of California at Davis, May 1995.
    • (1995) Technical Report
    • Bishop, M.1
  • 5
    • 1942425813 scopus 로고    scopus 로고
    • http://www.securityfocus.com/bid/5408/discussion/.
  • 6
    • 84976675816 scopus 로고
    • Binary Wrapping: A Technique for Instrumenting Object Code
    • June 1992
    • J. Cargille and B. P. Miller, 1992. Binary Wrapping: A Technique for Instrumenting Object Code, ACM SIGPLAN Notices, 27(6):17-18, June 1992.
    • (1992) ACM SIGPLAN Notices , vol.27 , Issue.6 , pp. 17-18
    • Cargille, J.1    Miller, B.P.2
  • 7
    • 84976675687 scopus 로고
    • Information transmission in computational systems
    • 1977
    • E. Cohen, 1977. Information transmission in computational systems, ACM SIGOPS Operating Systems Review, 11(5):133-139, 1977.
    • (1977) ACM SIGOPS Operating Systems Review , vol.11 , Issue.5 , pp. 133-139
    • Cohen, E.1
  • 9
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May 1976
    • D. Denning, 1976. A Lattice Model of Secure Information Flow, Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.1
  • 10
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • 1997
    • D. Denning and P.J. Denning, 1977. Certification of programs for secure information flow, Communications of the ACM, 20 (7) (1977) 504-513.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.J.2
  • 13
    • 4444381692 scopus 로고    scopus 로고
    • An Empirical Study of the Robustness of Windows NT Applications Using Random Testing
    • Seattle, August 2000
    • J. Forrester and B. Miller, 2000. An Empirical Study of the Robustness of Windows NT Applications Using Random Testing, The 4th Usenix Windows System Symposium, Seattle, August 2000.
    • (2000) The 4th Usenix Windows System Symposium
    • Forrester, J.1    Miller, B.2
  • 15
    • 1942457565 scopus 로고    scopus 로고
    • Analyzing Programs for Vulnerability to Buffer Overrun Attacks
    • Reliable Software Technologies, January
    • A. Ghosh and T. O'Connor. Analyzing Programs for Vulnerability to Buffer Overrun Attacks, Technical Report, Reliable Software Technologies, January 1998.
    • (1998) Technical Report
    • Ghosh, A.1    O'Connor, T.2
  • 16
    • 84880450431 scopus 로고    scopus 로고
    • Web application security assessment by fault injection and behavior monitoring
    • Yao-Wen Huang, Shih-Kun Huang, Tsung-Po Lin, Chung-Hung Tsai. Web application security assessment by fault injection and behavior monitoring. WWW. 2003;148-159.
    • (2003) WWW , pp. 148-159
    • Yao-Wen, H.1    Shih-Kun, H.2    Tsung-Po, L.3    Chung-Hung, T.4
  • 17
    • 0015672289 scopus 로고
    • A Note on the Confinement Problem
    • 1973
    • B. Lampson, 1973. A Note on the Confinement Problem, Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 18
    • 0028514027 scopus 로고
    • A Taxonomy of Computer Program Security Flaws, with Examples
    • September 1994
    • C. Landwehr, A. Bull, J. McDermott and W. Choi, 1994. A Taxonomy of Computer Program Security Flaws, with Examples, ACM Computing Surveys 26, no. 3, September 1994.
    • (1994) ACM Computing Surveys , vol.26 , Issue.3
    • Landwehr, C.1    Bull, A.2    McDermott, J.3    Choi, W.4
  • 19
    • 0025557712 scopus 로고
    • An Empirical Study of the Reliability of Unix Utilities
    • Dec. 1990
    • B. Miller, L. Fredricksen and B. So, 1990. An Empirical Study of the Reliability of Unix Utilities, Communications of the ACM, vol.33, no.12, Dec. 1990, pp. 32-44.
    • (1990) Communications of the ACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.1    Fredricksen, L.2    So, B.3
  • 20
    • 0003577356 scopus 로고
    • Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services
    • Computer Science Department, University of Wisconsin, November 1995
    • B. Miller, D. Koski, C. P. Lee, V. Maganty, R. Murthy, A. Natarajan and J. Steidl, 1995. Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services, Technical Report, Computer Science Department, University of Wisconsin, November 1995.
    • (1995) Technical Report
    • Miller, B.1    Koski, D.2    Lee, C.P.3    Maganty, V.4    Murthy, R.5    Natarajan, A.6    Steidl, J.7
  • 21
    • 1942521935 scopus 로고
    • Software development and proofs of multi-level security
    • San Francisco, CA, 1976
    • P. G. Neumann, et al. 1976. Software development and proofs of multi-level security, Proc. 2nd International Conference on Software Engineering, pp. 421-428, San Francisco, CA, 1976.
    • (1976) Proc. 2nd International Conference on Software Engineering , pp. 421-428
    • Neumann, P.G.1
  • 23
    • 0024684041 scopus 로고
    • With microscope and tweezers: The worm from MIT's perspective
    • J. Rochlis and M. Eichin. With microscope and tweezers: The worm from MIT's perspective, Communications of the ACM, June 1989.
    • (1989) Communications of the ACM
    • Rochlis, J.1    Eichin, M.2
  • 24
    • 0003954843 scopus 로고
    • Formal Methods and their Role in the Certification of Critical Systems
    • Computer Science Laboratory, SRI International, March 1995
    • J. Rushby, 1995. Formal Methods and their Role in the Certification of Critical Systems, Technical Report CSL-95-1, Computer Science Laboratory, SRI International, March 1995.
    • (1995) Technical Report , vol.CSL-95-1
    • Rushby, J.1
  • 25
    • 84856043672 scopus 로고
    • The Mathematical Theory of Communication
    • 1948
    • C. Shannon, 1948. The Mathematical Theory of Communication, The Bell System Technical Journal, vol. 27, pp. 379-423, 1948.
    • (1948) The Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.1
  • 26
    • 1942457566 scopus 로고    scopus 로고
    • http://www.immunitysec.com/spike.html.
  • 29
    • 1942521938 scopus 로고    scopus 로고
    • Taxonomy of security considerations and software quality
    • 2003
    • H. Wang and C. Wang, 2003. Taxonomy of security considerations and software quality. Communications of the ACM, 46(6): 75-78, 2003.
    • (2003) Communications of the ACM , vol.46 , Issue.6 , pp. 75-78
    • Wang, H.1    Wang, C.2
  • 31
    • 0037614325 scopus 로고    scopus 로고
    • MOPS: An infrastructure for examining security properties of software
    • UCB//CSD-02-1197, UC Berkeley, 2002
    • D. Wagner and H. Chen, 2002. MOPS: an infrastructure for examining security properties of software, Technical Report, UCB//CSD-02-1197, UC Berkeley, 2002.
    • (2002) Technical Report
    • Wagner, D.1    Chen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.