메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1017-1025

How can the developer benefit from security modeling?

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER CRIME; MATHEMATICAL MODELS; PROBLEM SOLVING; USER INTERFACES;

EID: 34548177309     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2007.96     Document Type: Conference Paper
Times cited : (17)

References (48)
  • 1
    • 34548166816 scopus 로고    scopus 로고
    • A causebased approach to preventing software vulnerabilities
    • submitted
    • S. Ardi, D. Byers, C. Duma, and N. Shahmehri. A causebased approach to preventing software vulnerabilities, (submitted).
    • Ardi, S.1    Byers, D.2    Duma, C.3    Shahmehri, N.4
  • 4
  • 5
    • 34548155467 scopus 로고
    • CERT/CC statistics, accessed December 14 2006
    • CERT/CC statistics 1988-2006. http://wv7w.cert.org/stats/ (accessed December 14 2006).
    • (1988)
  • 7
    • 34548153996 scopus 로고    scopus 로고
    • accessed December 12
    • Coverity. Prevent, http://www.coverity.com/(accessed December 12 2006).
    • (2006) Prevent
    • Coverity1
  • 9
    • 80755173828 scopus 로고    scopus 로고
    • Fortify Software, accessed December 12
    • Fortify Software. Fortify SCA. http://www.fortifysoftware.com/products/ sca/ (accessed December 12 2006).
    • (2006) Fortify SCA
  • 10
    • 10944269120 scopus 로고    scopus 로고
    • Building more secure software with improved development process
    • M. Howard. Building more secure software with improved development process. IEEE Security & Privacy, 2(6):63-65, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.6 , pp. 63-65
    • Howard, M.1
  • 11
    • 84888548305 scopus 로고    scopus 로고
    • accessed December 12 2006
    • Klocwork. K7. http://www.klocwork.com/ (accessed December 12 2006).
    • Klocwork. K7
  • 15
    • 2342581753 scopus 로고    scopus 로고
    • From the ground up: The DIMACS software security workshop
    • March-April
    • G. McGraw. From the ground up: The DIMACS software security workshop. IEEE Security & Privacy, 1(2):59-66, March-April 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.2 , pp. 59-66
    • McGraw, G.1
  • 19
    • 34548183300 scopus 로고    scopus 로고
    • NIST. The national vulnerability database, http://nvd.nist.gov/ (accessed December 8 2006).
    • NIST. The national vulnerability database, http://nvd.nist.gov/ (accessed December 8 2006).
  • 20
    • 34548153765 scopus 로고    scopus 로고
    • NIST, accessed December 12
    • NIST. Source code analyzers, http://samate.nist.gov/index.php/ Source_Code_Analyzers (accessed December 12 2006).
    • (2006) Source code analyzers
  • 21
    • 34548178250 scopus 로고    scopus 로고
    • OMG. Meta-object facility MOF™, version 1.4, accessed December 13 2006
    • OMG. Meta-object facility (MOF™), version 1.4. http://www.omg.org/ technology/documents/formal/mof.htm (accessed December 13 2006).
  • 22
    • 34548179600 scopus 로고    scopus 로고
    • OMG. MOF 2.0/XMI mapping specification, version 2.1. http://www.omg.org/ technology/documents/formal/xmi.htm(accessed December 13 2006).
    • OMG. MOF 2.0/XMI mapping specification, version 2.1. http://www.omg.org/ technology/documents/formal/xmi.htm(accessed December 13 2006).
  • 23
    • 34548154235 scopus 로고    scopus 로고
    • OMG. Unified modeling language, version 2.0, accessed December 13 2006
    • OMG. Unified modeling language, version 2.0. http://www.omg.org/ technology/documents/formal/uml.htm (accessed December 13 2006).
  • 25
    • 34548159463 scopus 로고    scopus 로고
    • accessed December 12 2006
    • Ounce Labs. Ounce, http://www.ouncelabs.com/(accessed December 12 2006).
    • Ounce Labs. Ounce
  • 26
  • 27
    • 34548150451 scopus 로고    scopus 로고
    • accessed December 8 2006
    • Packet Storm Advisories. http://packetstormsecurity.org (accessed December 8 2006).
    • Packet Storm Advisories
  • 28
    • 34548177508 scopus 로고    scopus 로고
    • Software vulnerability taxonomy consolidation
    • Technical Report UCRL-TH-208822, Lawrence Livermore National Laboratory
    • S. Polepeddi. Software vulnerability taxonomy consolidation. Technical Report UCRL-TH-208822, Lawrence Livermore National Laboratory, 2005.
    • (2005)
    • Polepeddi, S.1
  • 31
    • 34548164812 scopus 로고    scopus 로고
    • Root cause analysis guidance document. U.S.Department of Energy Guideline DOE-NE-STD-1004-92, 1992.
    • Root cause analysis guidance document. U.S.Department of Energy Guideline DOE-NE-STD-1004-92, 1992.
  • 33
    • 34548190032 scopus 로고    scopus 로고
    • B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, December 1999.
    • B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, December 1999.
  • 35
    • 34548165534 scopus 로고    scopus 로고
    • Secure Software, accessed December 12
    • Secure Software. CodeAssure. http://www.securesof tware.com/ (accessed December 12 2006).
    • (2006) CodeAssure
  • 36
    • 34547274967 scopus 로고    scopus 로고
    • Secure Software, Inc, accessed April
    • Secure Software, Inc. The CLASP application security process, http://www.securesoftware.com/ (accessed April 2006).
    • (2006) The CLASP application security process
  • 39
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10(1):34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, L.2
  • 40
    • 34548152537 scopus 로고    scopus 로고
    • splint.org. Splint - annotation-assisted lightweight static checking, http://splint.org/ (accessed December 12 2006).
    • splint.org. Splint - annotation-assisted lightweight static checking, http://splint.org/ (accessed December 12 2006).
  • 41
    • 34548181582 scopus 로고    scopus 로고
    • F. Swiderski and W. Snyder. Threat Modeling. Microsoft Professional, 2004.
    • F. Swiderski and W. Snyder. Threat Modeling. Microsoft Professional, 2004.
  • 42
    • 34548168323 scopus 로고    scopus 로고
    • The Open Web Application Security Project, accessed December 8
    • The Open Web Application Security Project. OWASP Category:Vulnerability. http://www.owasp.org/index.php/Category:Vulnerability (accessed December 8 2006).
    • (2006) OWASP Category:Vulnerability
  • 44
    • 27644580707 scopus 로고    scopus 로고
    • Demystifying the threat-modeling process
    • P. Torr. Demystifying the threat-modeling process. IEEE Security & Privacy, 3(5):66-70, 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.5 , pp. 66-70
    • Torr, P.1
  • 47
    • 84872107422 scopus 로고    scopus 로고
    • accessed December 12
    • D.A.Wheeler. Flawfinder. http://www.dwheeler.com/flawfinder/ (accessed December 12 2006).
    • (2006) Flawfinder
    • Wheeler, D.A.1
  • 48
    • 34548153542 scopus 로고    scopus 로고
    • Internet Security Systems X-Force Alerts and Advisories, accessed December 8 2006
    • Internet Security Systems X-Force Alerts and Advisories. http://xforce.iss.net/ (accessed December 8 2006).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.