-
2
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
William A. Arbaugh, William L. Fithen, and John McHugh. Windows of vulnerability: A case study analysis. Computer, 33(12):52-59, 2000.
-
(2000)
Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
3
-
-
75749147262
-
A few billion lines of code later: Using static analysis to find bugs in the real world
-
Al Bessey, Ken Block, Ben Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, and Dawson Engler. A few billion lines of code later: using static analysis to find bugs in the real world. Communications of the ACM, 53(2):66-75, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.2
, pp. 66-75
-
-
Bessey, A.1
Block, K.2
Chelf, B.3
Chou, A.4
Fulton, B.5
Hallem, S.6
Henri-Gros, C.7
Kamsky, A.8
McPeak, S.9
Engler, D.10
-
4
-
-
85170021807
-
-
Koders.com. April
-
BlackDuck. Koders.com. http://corp.koders.com/about/, April 2010.
-
(2010)
BlackDuck
-
-
-
6
-
-
0036041421
-
An empirical study of operating systems errors
-
October
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. In Proceedings, 18th ACM Symposium on Operating Systems Principles, pages 73-82, October 2001.
-
(2001)
Proceedings, 18th ACM Symposium on Operating Systems Principles
, pp. 73-82
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
8
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-tuong, and Jason Hiser. N-variant systems: A secretless framework for security through diversity. In In Proceedings of the 15th USENIX Security Symposium, pages 105-120, 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 105-120
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-tuong, A.8
Hiser, J.9
-
11
-
-
78751563437
-
-
Eth zurich, dissertation 18197, ETH Zurich, ISBN 1-4392-5409-5, ISBN-13: 9781439254097
-
Stefan Frei. Security Econometrics - The Dynamics of (In)Security. Eth zurich, dissertation 18197, ETH Zurich, 2009. ISBN 1-4392-5409-5, ISBN-13: 9781439254097.
-
(2009)
Security Econometrics - The Dynamics of (In)Security
-
-
Frei, S.1
-
12
-
-
0018505572
-
A time dependent error detection model for software reliability and other performance measures
-
August
-
A.L. Goel and K. Okumoto. A time dependent error detection model for software reliability and other performance measures. IEEE Transactions on Reliability, R-28:206-211, August 1979.
-
(1979)
IEEE Transactions on Reliability
, vol.R-28
, pp. 206-211
-
-
Goel, A.L.1
Okumoto, K.2
-
14
-
-
85170002191
-
-
IBM Internet Security Systems - X-Force. X-Force Advisory. http://www.iss.net.
-
X-Force Advisory
-
-
-
16
-
-
50649084510
-
Post-release reliability growth in software products
-
Pankaj Jalote, Brendan Murphy, and Vibhu Saujanya Sharma. Post-release reliability growth in software products. ACM Trans. Softw. Eng. Methodol., 17(4):1-20, 2008.
-
(2008)
ACM Trans. Softw. Eng. Methodol.
, vol.17
, Issue.4
, pp. 1-20
-
-
Jalote, P.1
Murphy, B.2
Sharma, V.S.3
-
17
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Erland Jonsson and Tomas Olovsson. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Softw. Eng., 23(4):235-245, 1997.
-
(1997)
IEEE Trans. Softw. Eng.
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
19
-
-
85169999453
-
-
Microsoft. Internet explorer architecture. http://msdn.microsoft.com/en- us/library/aa741312(VS.85).aspx, 2010.
-
(2010)
Internet Explorer Architecture
-
-
-
20
-
-
85170024238
-
-
September
-
Microsoft Corporation. Microsoft security development lifecycle. http://www.microsoft.com/security/sdl/benefits/measurable.aspx, September 2008.
-
(2008)
Microsoft Security Development Lifecycle
-
-
-
21
-
-
0016557617
-
A theory of software reliability and its application
-
September
-
John D. Musa. A theory of software reliability and its application. IEEE Transactions on Security Engineering, SE-1:312-327, September 1975.
-
(1975)
IEEE Transactions on Security Engineering
, vol.SE-1
, pp. 312-327
-
-
Musa, J.D.1
-
22
-
-
0003960126
-
-
McGraw-Hill
-
John D. Musa, Anthony Iannino, and Kasuhira Okumoto. Software Reliability: Measurement, Prediction, Application. McGraw-Hill, 1987.
-
(1987)
Software Reliability: Measurement, Prediction, Application
-
-
Musa, J.D.1
Iannino, A.2
Okumoto, K.3
-
24
-
-
67650197986
-
Improving vulnerability discovery models
-
New York, NY, USA, ACM
-
Andy Ozment. Improving vulnerability discovery models. In QoP '07: Proceedings of the 2007 ACM workshop on Quality of protection, pages 6-11, New York, NY, USA, 2007. ACM.
-
(2007)
QoP '07: Proceedings of the 2007 ACM Workshop on Quality of Protection
, pp. 6-11
-
-
Ozment, A.1
-
26
-
-
0020904598
-
Theory of program testing - An overview
-
December
-
R.E. Prather. Theory of program testing - an overview. Bell System Technical Journal, 72(10):3073-3105, December 1983.
-
(1983)
Bell System Technical Journal
, vol.72
, Issue.10
, pp. 3073-3105
-
-
Prather, R.E.1
-
31
-
-
78751508536
-
-
SecurityTracker
-
SecurityTracker. http://www.SecurityTracker.com. SecurityTracker.
-
SecurityTracker
-
-
-
32
-
-
85170004857
-
-
TippingPoint
-
TippingPoint. Zero day initiative (zdi). http://www.zerodayinitiative. com/.
-
Zero Day Initiative (Zdi)
-
-
-
33
-
-
85170001761
-
-
US-CERT. Vulnerability statistics. http://www.cert.org/stats/ vulnerability\-remediation.html.
-
Vulnerability Statistics
-
-
-
34
-
-
84936775391
-
-
Vupen. Vupen security. http://www.vupen.com.
-
Vupen Security
-
-
|