메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 505-512

A rule-based security auditing tool for software vulnerability detection

Author keywords

[No Author keywords available]

Indexed keywords

MALICIOUS CODE; PERSONAL INFORMATION; SECURITY AUDITING TOOL; SOFTWARE VULNERABILITY;

EID: 34247267667     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICHIT.2006.253653     Document Type: Conference Paper
Times cited : (14)

References (22)
  • 1
    • 34247262574 scopus 로고    scopus 로고
    • A. Dekok, PScan. Striker-On-Line. www. striker. Ottawa. on.ca/~aland/pscan/, Oct28, 2003.
    • A. Dekok, PScan. Striker-On-Line. www. striker. Ottawa. on.ca/~aland/pscan/, Oct28, 2003.
  • 2
    • 77954669340 scopus 로고    scopus 로고
    • BLAST User's Manual
    • May 16
    • "BLAST User's Manual", May 16, 2004. http://www-cad.eecs. berkeley.edu/~tah/blast/
    • (2004)
  • 5
    • 34247272955 scopus 로고    scopus 로고
    • Crispin Cowan, Perry Wagle an Calton Pu, Steve Beattie, and Jonathan Walpole. Buffer Overflows: attacks and defenses for the vulnerability of the decade, In Proc. of the DARPA Information Survivability Conference and Expo, 1999.
    • Crispin Cowan, Perry Wagle an Calton Pu, Steve Beattie, and Jonathan Walpole. Buffer "Overflows: attacks and defenses for the vulnerability of the decade", In Proc. of the DARPA Information Survivability Conference and Expo, 1999.
  • 8
    • 34247191941 scopus 로고    scopus 로고
    • Oct. 28
    • D. Wheeler, Flawfinder. www.dwheeler.com/flawfinder/, Oct. 28, 2003.
    • (2003) Flawfinder
    • Wheeler, D.1
  • 10
    • 0004239103 scopus 로고    scopus 로고
    • 4th Edition. McGraw-Hill, Berkeley, CA
    • H. Schildt, C: The Complete Reference, 4th Edition. McGraw-Hill, Berkeley, CA, 2000, 309-382.
    • (2000) C: The Complete Reference , pp. 309-382
    • Schildt, H.1
  • 11
    • 34247247708 scopus 로고    scopus 로고
    • Hao Chen, David Wagner and David Schultz at Computer Science Division, UC Berkeley, MOPS User's Manual
    • Hao Chen, David Wagner and David Schultz at Computer Science Division, UC Berkeley, "MOPS User's Manual"
  • 14
    • 34247181993 scopus 로고    scopus 로고
    • Howard. M. and LeBlanc, D. Writing, Secure Code. Microsoft Press, Redmond, WA, 2002, 63-88.
    • Howard. M. and LeBlanc, D. Writing, Secure Code. Microsoft Press, Redmond, WA, 2002, 63-88.
  • 15
    • 77953090379 scopus 로고    scopus 로고
    • Methods for the prevention, detection and removal of software security vulnerabilities
    • Jay-Evan J. Tevis, John A. Hamilton, "Methods for the prevention, detection and removal of software security vulnerabilities", ACM Southeast Regional Conference 2004, 197-202.
    • ACM Southeast Regional Conference 2004 , pp. 197-202
    • Tevis, J.J.1    Hamilton, J.A.2
  • 16
    • 34247275747 scopus 로고    scopus 로고
    • John Viega, J.T. Bloch, Tadayoshi Kohno, Gary McGraw Reliable Software Technologies, ITS4: A Static Vulnerability Scanner for C and C++ Code, http://www.rstcorp.com.
    • John Viega, J.T. Bloch, Tadayoshi Kohno, Gary McGraw Reliable Software Technologies, "ITS4: A Static Vulnerability Scanner for C and C++ Code", http://www.rstcorp.com.
  • 19
    • 0030092390 scopus 로고    scopus 로고
    • Checking for Race Conditions in File Accesses
    • Spring
    • M. Bishop and M. Digler, "Checking for Race Conditions in File Accesses", Computing Systems, 9(2): 131-152, Spring 1996.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Digler, M.2
  • 20
    • 48849110167 scopus 로고    scopus 로고
    • Secure Software, Secure Software Inc, Oct. 28
    • Secure Software, Rough Auditing Tool for Security (RATS), Secure Software Inc. www.securesoftware.com, Oct. 28, 2003.
    • (2003) Rough Auditing Tool for Security (RATS)
  • 22
    • 35248827669 scopus 로고    scopus 로고
    • Software Verification with Blast
    • Proceedings of the 10th SPIN Workshop on Model Checking Software SPIN, Springer-Verlag
    • Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, and Gregoire Sutre, "Software Verification with Blast", Proceedings of the 10th SPIN Workshop on Model Checking Software (SPIN), Lecture Notes in Computer Science 2648, Springer-Verlag, pages 235-239, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2648 , pp. 235-239
    • Henzinger, T.A.1    Jhala, R.2    Majumdar, R.3    Sutre, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.