-
1
-
-
12344279827
-
Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security?
-
(January 05 - 08, 2004). HICSS. IEEE Computer Society, Washington, DC
-
Heffley, J. and Meunier, P. 2004. "Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security?" Proc. 37th Annual Hawaii international Conference on System Sciences (HICSS'04) - Track 9 - Volume 9 (January 05 - 08, 2004). HICSS. IEEE Computer Society, Washington, DC, 90277.
-
(2004)
Proc. 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9
, vol.9
, pp. 90277
-
-
Heffley, J.1
Meunier, P.2
-
6
-
-
0004026606
-
-
Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July
-
Lions, J. L. ARIANE 5 Flight 501 Failure Report. Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July 1996.
-
(1996)
ARIANE 5 Flight 501 Failure Report
-
-
Lions, J.L.1
-
7
-
-
0344859490
-
-
(Version 1.900.0). December
-
Michael D. Adams. JasPer Software Reference Manual (Version 1.900.0). December 2006. http://www.ece.uvic.ca/~mdadams/jasper/jasper.pdf
-
(2006)
JasPer Software Reference Manual
-
-
Adams, M.D.1
-
8
-
-
79952020076
-
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
-
Reston, VA: ISOC
-
Brumley, David; Chiueh, Tzi-cker; Johnson, Robert; Lin, Huijia; and Song, Dawn. "RICH: Automatically Protecting Against Integer-Based Vulnerabilities." Proc. NDSS, San Diego, CA, Feb. 2007. Reston, VA: ISOC, 2007. http://www.cs.berkeley.edu/~dawnsong/papers/efficient-detection-integer- based-attacks.pdf
-
Proc. NDSS, San Diego, CA, Feb. 2007
, vol.2007
-
-
Brumley, D.1
Chiueh, T.-C.2
Johnson, R.3
Lin, H.4
Song, D.5
-
10
-
-
79952029195
-
-
Washington, D.C.: International Committee for Information Technology Standards
-
Hedquist, Barry. ISO/JTC1/SC22/WG14 AND INCITS PL22.11 MARCH/APRIL MEETING. MINUTES). Washington, D.C.: International Committee for Information Technology Standards, 2009. http://www.open-std.org/jtc1/sc22/wg14/www/docs/ n1421.pdf
-
(2009)
ISO/JTC1/SC22/WG14 and INCITS PL22.11 March/april Meeting. Minutes
-
-
Hedquist, B.1
-
11
-
-
79952034001
-
-
International Standards Organization. ISO/IEC TR 24731. Geneva, Switzerland: International Standards Organization, April
-
International Standards Organization. ISO/IEC TR 24731. Extensions to the C Library, - Part I: Bounds-checking interfaces. Geneva, Switzerland: International Standards Organization, April 2006.
-
(2006)
Extensions to the C Library, - Part I: Bounds-checking Interfaces
-
-
-
12
-
-
79952017260
-
Eliminating Buffer Overflows, Using the Compiler or a Standalone Tool
-
Washington, D.C.: U.S.
-
Plum, Thomas and Keaton, David M. "Eliminating Buffer Overflows, Using the Compiler or a Standalone Tool." Proc. Workshop on Software Security Assurance Tools, Techniques, and Metrics, Long Beach, CA, November 7-8, 2005. Washington, D.C.: U.S. National Institute of Standards and Technology (NIST), 2005. http://samate.nist.gov/docs/NIST-Special-Publication-500-265.pdf
-
(2005)
Proc. Workshop on Software Security Assurance Tools, Techniques, and Metrics, Long Beach, CA, November 7-8, 2005
-
-
Plum, T.1
Keaton, D.M.2
|