-
1
-
-
34548166816
-
A causebased approach to preventing software vulnerabilities
-
submitted
-
S. Ardi, D. Byers, C. Duma, and N. Shahmehri. A causebased approach to preventing software vulnerabilities, (submitted).
-
-
-
Ardi, S.1
Byers, D.2
Duma, C.3
Shahmehri, N.4
-
3
-
-
34547295881
-
Modeling software vulnerabilities with vulnerability cause graphs
-
Philadelphia, PA, USA
-
D. Byers, S. Ardi, N. Shahmehri, and C. Duma. Modeling software vulnerabilities with vulnerability cause graphs. In Procedeengs of the International Conference on Software Maintenance, Philadelphia, PA, USA, 2006.
-
(2006)
Procedeengs of the International Conference on Software Maintenance
-
-
Byers, D.1
Ardi, S.2
Shahmehri, N.3
Duma, C.4
-
4
-
-
34548169987
-
-
CERIAS, accessed December 8
-
CERIAS. Coop VDB - the public vulnerability database, https://cirdb.cerias.purdue.edu/coopvdb/public/ (accessed December 8 2006).
-
(2006)
Coop VDB - the public vulnerability database
-
-
-
5
-
-
34548155467
-
-
CERT/CC statistics, accessed December 14 2006
-
CERT/CC statistics 1988-2006. http://wv7w.cert.org/stats/ (accessed December 14 2006).
-
(1988)
-
-
-
7
-
-
34548153996
-
-
accessed December 12
-
Coverity. Prevent, http://www.coverity.com/(accessed December 12 2006).
-
(2006)
Prevent
-
-
Coverity1
-
9
-
-
80755173828
-
-
Fortify Software, accessed December 12
-
Fortify Software. Fortify SCA. http://www.fortifysoftware.com/products/ sca/ (accessed December 12 2006).
-
(2006)
Fortify SCA
-
-
-
10
-
-
10944269120
-
Building more secure software with improved development process
-
M. Howard. Building more secure software with improved development process. IEEE Security & Privacy, 2(6):63-65, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.6
, pp. 63-65
-
-
Howard, M.1
-
11
-
-
84888548305
-
-
accessed December 12 2006
-
Klocwork. K7. http://www.klocwork.com/ (accessed December 12 2006).
-
Klocwork. K7
-
-
-
14
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
Washington, DC, USA, IEEE Computer Society
-
J. McDermott and C. Fox. Using abuse case models for security requirements analysis. In ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference, page 55, Washington, DC, USA, 1999. IEEE Computer Society.
-
(1999)
ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference
, pp. 55
-
-
McDermott, J.1
Fox, C.2
-
15
-
-
2342581753
-
From the ground up: The DIMACS software security workshop
-
March-April
-
G. McGraw. From the ground up: The DIMACS software security workshop. IEEE Security & Privacy, 1(2):59-66, March-April 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.2
, pp. 59-66
-
-
McGraw, G.1
-
19
-
-
34548183300
-
-
NIST. The national vulnerability database, http://nvd.nist.gov/ (accessed December 8 2006).
-
NIST. The national vulnerability database, http://nvd.nist.gov/ (accessed December 8 2006).
-
-
-
-
20
-
-
34548153765
-
-
NIST, accessed December 12
-
NIST. Source code analyzers, http://samate.nist.gov/index.php/ Source_Code_Analyzers (accessed December 12 2006).
-
(2006)
Source code analyzers
-
-
-
21
-
-
34548178250
-
-
OMG. Meta-object facility MOF™, version 1.4, accessed December 13 2006
-
OMG. Meta-object facility (MOF™), version 1.4. http://www.omg.org/ technology/documents/formal/mof.htm (accessed December 13 2006).
-
-
-
-
22
-
-
34548179600
-
-
OMG. MOF 2.0/XMI mapping specification, version 2.1. http://www.omg.org/ technology/documents/formal/xmi.htm(accessed December 13 2006).
-
OMG. MOF 2.0/XMI mapping specification, version 2.1. http://www.omg.org/ technology/documents/formal/xmi.htm(accessed December 13 2006).
-
-
-
-
23
-
-
34548154235
-
-
OMG. Unified modeling language, version 2.0, accessed December 13 2006
-
OMG. Unified modeling language, version 2.0. http://www.omg.org/ technology/documents/formal/uml.htm (accessed December 13 2006).
-
-
-
-
25
-
-
34548159463
-
-
accessed December 12 2006
-
Ounce Labs. Ounce, http://www.ouncelabs.com/(accessed December 12 2006).
-
Ounce Labs. Ounce
-
-
-
26
-
-
34548172215
-
-
OWASP, accessed December 12
-
OWASP. LAPSE: Web application security scanner for java. http://www.owasp.org/index.php/Category:OWASP_LAPSE_Project (accessed December 12 2006).
-
(2006)
LAPSE: Web application security scanner for java
-
-
-
27
-
-
34548150451
-
-
accessed December 8 2006
-
Packet Storm Advisories. http://packetstormsecurity.org (accessed December 8 2006).
-
Packet Storm Advisories
-
-
-
28
-
-
34548177508
-
Software vulnerability taxonomy consolidation
-
Technical Report UCRL-TH-208822, Lawrence Livermore National Laboratory
-
S. Polepeddi. Software vulnerability taxonomy consolidation. Technical Report UCRL-TH-208822, Lawrence Livermore National Laboratory, 2005.
-
(2005)
-
-
Polepeddi, S.1
-
29
-
-
34247539967
-
Comparing lexical analysis tools for buffer overflow detection in network software
-
Bangalore, India
-
D. Pozza, R. Sisto, L. Durante, and A. Valenzano. Comparing lexical analysis tools for buffer overflow detection in network software. In Proceedings of First International Conference on Communication System Software and Middleware (Comsware06), Bangalore, India, 2006.
-
(2006)
Proceedings of First International Conference on Communication System Software and Middleware (Comsware06)
-
-
Pozza, D.1
Sisto, R.2
Durante, L.3
Valenzano, A.4
-
31
-
-
34548164812
-
-
Root cause analysis guidance document. U.S.Department of Energy Guideline DOE-NE-STD-1004-92, 1992.
-
Root cause analysis guidance document. U.S.Department of Energy Guideline DOE-NE-STD-1004-92, 1992.
-
-
-
-
33
-
-
34548190032
-
-
B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, December 1999.
-
B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, December 1999.
-
-
-
-
35
-
-
34548165534
-
-
Secure Software, accessed December 12
-
Secure Software. CodeAssure. http://www.securesof tware.com/ (accessed December 12 2006).
-
(2006)
CodeAssure
-
-
-
36
-
-
34547274967
-
-
Secure Software, Inc, accessed April
-
Secure Software, Inc. The CLASP application security process, http://www.securesoftware.com/ (accessed April 2006).
-
(2006)
The CLASP application security process
-
-
-
39
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10(1):34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, L.2
-
40
-
-
34548152537
-
-
splint.org. Splint - annotation-assisted lightweight static checking, http://splint.org/ (accessed December 12 2006).
-
splint.org. Splint - annotation-assisted lightweight static checking, http://splint.org/ (accessed December 12 2006).
-
-
-
-
41
-
-
34548181582
-
-
F. Swiderski and W. Snyder. Threat Modeling. Microsoft Professional, 2004.
-
F. Swiderski and W. Snyder. Threat Modeling. Microsoft Professional, 2004.
-
-
-
-
42
-
-
34548168323
-
-
The Open Web Application Security Project, accessed December 8
-
The Open Web Application Security Project. OWASP Category:Vulnerability. http://www.owasp.org/index.php/Category:Vulnerability (accessed December 8 2006).
-
(2006)
OWASP Category:Vulnerability
-
-
-
44
-
-
27644580707
-
Demystifying the threat-modeling process
-
P. Torr. Demystifying the threat-modeling process. IEEE Security & Privacy, 3(5):66-70, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.5
, pp. 66-70
-
-
Torr, P.1
-
45
-
-
84949505015
-
Its4: A static vulnerability scanner for c and c++ code
-
New Orleans, LA, USA
-
J. Viega, J. T. Bloch, Y. Kohno, and G. McGraw. Its4: A static vulnerability scanner for c and c++ code. In Procedeeings of the 16th Annual Computer Security Applications Conference, pages 257-271, New Orleans, LA, USA, 2000.
-
(2000)
Procedeeings of the 16th Annual Computer Security Applications Conference
, pp. 257-271
-
-
Viega, J.1
Bloch, J.T.2
Kohno, Y.3
McGraw, G.4
-
46
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
San Diego, CA, USA
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of Network and Distributed Systems Security Symposium, pages 3-17, San Diego, CA, USA, 2000.
-
(2000)
Proceedings of Network and Distributed Systems Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
47
-
-
84872107422
-
-
accessed December 12
-
D.A.Wheeler. Flawfinder. http://www.dwheeler.com/flawfinder/ (accessed December 12 2006).
-
(2006)
Flawfinder
-
-
Wheeler, D.A.1
-
48
-
-
34548153542
-
-
Internet Security Systems X-Force Alerts and Advisories, accessed December 8 2006
-
Internet Security Systems X-Force Alerts and Advisories. http://xforce.iss.net/ (accessed December 8 2006).
-
-
-
|