메뉴 건너뛰기




Volumn , Issue , 2011, Pages 964-967

Empirical results on the study of software vulnerabilities (NIER track)

Author keywords

buffer overflow; experiment; repository; software vulnerability

Indexed keywords

BODY OF KNOWLEDGE; BUFFER OVERFLOWS; EMPIRICAL RESULTS; MANUAL INSPECTION; REPOSITORY; SOFTWARE ASSURANCE; SOFTWARE VULNERABILITIES; SOFTWARE VULNERABILITY;

EID: 79959888787     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1985793.1985960     Document Type: Conference Paper
Times cited : (12)

References (18)
  • 6
    • 36348977135 scopus 로고    scopus 로고
    • Version 1.6. 29 Oct.
    • CWE - Common Weakness Enumeration Version 1.6. 29 Oct. 2009. The MITRE Corporation. http://cwe.mitre.org/.
    • (2009) CWE - Common Weakness Enumeration
  • 7
    • 77956769752 scopus 로고    scopus 로고
    • Studying Software Vulnerabilities
    • September/October
    • Gandhi, R. A. Siy, H., and Wu, Y. Studying Software Vulnerabilities. CrossTalk, September/October 2010.
    • (2010) CrossTalk
    • Gandhi, R.A.1    Siy, H.2    Wu, Y.3
  • 11
    • 0028514027 scopus 로고
    • A Taxonomy of Computer Program Security Flaws with Examples
    • Sept.
    • Landwehr, C., et al. A Taxonomy of Computer Program Security Flaws with Examples. ACM Computing Surveys 26, 3, Sept., 1994
    • (1994) ACM Computing Surveys , vol.26 , pp. 3
    • Landwehr, C.1
  • 14
    • 79959877443 scopus 로고    scopus 로고
    • The Apache HTTP Server Project. http://httpd.apache.org
  • 16
    • 79959884179 scopus 로고    scopus 로고
    • Web Application Security Consortium 2005
    • Web Application Security Consortium 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.