메뉴 건너뛰기




Volumn , Issue , 2011, Pages 97-106

One technique is not enough: A comparison of vulnerability discovery techniques

Author keywords

Blackbox testing; Penetration testing; Security; Static analysis; Vulnerability; Whitebox testing

Indexed keywords

AUTOMATION; STATIC ANALYSIS;

EID: 84858741061     PISSN: 19493770     EISSN: 19493789     Source Type: Conference Proceeding    
DOI: 10.1109/esem.2011.18     Document Type: Conference Paper
Times cited : (110)

References (24)
  • 3
    • 14744271048 scopus 로고    scopus 로고
    • Application penetration testing
    • Jan.-Feb.
    • H.H. Thompson, "Application penetration testing, " IEEE Security & Privacy, vol. 3, no. 1, p. 66, Jan.-Feb. 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 66
    • Thompson, H.H.1
  • 4
    • 84877922658 scopus 로고    scopus 로고
    • Web application security: Automated scanning versus manual penetration testing
    • IBM
    • D Allan, "Web application security: automated scanning versus manual penetration testing, " IBM Rational Software, Somers, White Paper 2008.
    • (2008) Rational Software, Somers, White Paper
    • Allan, D.1
  • 5
    • 10944267118 scopus 로고    scopus 로고
    • Static analysis for security
    • Novemeber - December
    • B. Chess and G. McGraw, "Static Analysis for Security, " IEEE Security and Privacy, vol. 2, no. 6, pp. 76-79, Novemeber - December 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 76-79
    • Chess, B.1    Mcgraw, G.2
  • 6
    • 14544301479 scopus 로고    scopus 로고
    • Finding bugs is easy
    • December
    • W. Pugh and D. Hovemeyer, "Finding bugs is easy, " ACM SIGPLAN Notices, vol. 39, no. 12, December 2004.
    • (2004) ACM SIGPLAN Notices , vol.39 , Issue.12
    • Pugh, W.1    Hovemeyer, D.2
  • 9
    • 77955205925 scopus 로고    scopus 로고
    • (August) HttpOnly. [Online]
    • The Open Web Application Security Project. (2010, August) HttpOnly. [Online]. http://www.owasp.org/index.php/HttpOnly.
    • (2010) The Open Web Application Security Project
  • 10
    • 36348977135 scopus 로고    scopus 로고
    • (March), [Online
    • The MITRE Corporation. (2011, March) Common Weakness Enumeration. [Online]. http://cwe.mitre.org/.
    • (2011) Common Weakness Enumeration
  • 11
    • 77649285593 scopus 로고    scopus 로고
    • Comparing the effectiveness of penetration testing and static code analysis on the detection of sql injection vulnerabilities in web services
    • Shanghai
    • N. Antunes and M. Vieira, "Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services, " in 15th IEEE Pacific Rim International Symposium on Dependable Computing, Shanghai, 2009, p. 301.
    • (2009) 15th IEEE Pacific Rim International Symposium on Dependable Computing , pp. 301
    • Antunes, N.1    Vieira, M.2
  • 17
    • 84855469614 scopus 로고    scopus 로고
    • (January), [Online]
    • G. McGraw and J. Steven. (2011, January) informIT. [Online]. http://www.informit.com/articles/article.aspx?p=1680863.
    • (2011) InformIT
    • Mcgraw, G.1    Steven, J.2
  • 20
    • 84855446756 scopus 로고    scopus 로고
    • OEMR.ORG. (February), [Online]
    • OEMR.ORG. (2011, February) OpenEMR Commercial Help. [Online]. http://www.openmedsoftware.org/wiki/OpenEMR-Commercial-Help.
    • (2011) OpenEMR Commercial Help
  • 22
    • 80052388280 scopus 로고    scopus 로고
    • Challenges for protecting the privacy of health information: Required certification can leave common vulnerabilities undetected
    • Chicago
    • B. Smith et al., "Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected, " in Security and Privacy in Medical and Home-care Systems (SPIMACS 2010) Workshop, Chicago, 2010, pp. 1-12.
    • (2010) Security and Privacy in Medical and Home-care Systems (SPIMACS 2010) Workshop , pp. 1-12
    • Smith, B.1
  • 23
    • 84855440241 scopus 로고    scopus 로고
    • (September), [Online
    • S. Barnum and M. Gegick. (September, 2005) Defense in Depth. [Online]. https://buildsecurityin.us-cert.gov/bsi/articles/knowledge/principles/347-BSI. html.
    • (2005) Defense in Depth
    • Barnum, S.1    Gegick, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.