-
1
-
-
34250003707
-
The contemporary software security landscape
-
Ahmad, D. (2007). The contemporary software security landscape. IEEE Security and Privacy, 5(3), 75-77.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 75-77
-
-
Ahmad, D.1
-
2
-
-
26444516466
-
Security vulnerabilities in software systems: A quantitative perspective
-
Ihazmi, O., Malaiya, Y., and Ray, I. (2005, August). Security vulnerabilities in software systems: A quantitative perspective. Data and Applications Security XIX, 3654, 281-294.
-
(2005)
Data and Applications Security
, vol.19
, Issue.3654
, pp. 281-294
-
-
Ihazmi, O.1
Malaiya, Y.2
Ray, I.3
-
5
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis, A., Laprie, J.-C., Randell, B., and Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions Dependable and Secure Computing, 1(1), 11-33.
-
(2004)
IEEE Transactions Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
6
-
-
85025345098
-
Introduction to attack patterns. Us-cert: Build security in web site
-
Barnum, S. and Sethi, A. (2006). Introduction to attack patterns. US-CERT: Build security in Web site. Citigal. Available at https://buildsecu rityin. us-cert.gov/daisy/bsi/articles/knowledge/attack/585.html
-
(2006)
Citigal
-
-
Barnum, S.1
Sethi, A.2
-
7
-
-
33747205462
-
On the brittleness of software and the infeasibility of security metrics
-
Bellovin, S. S. (2006). On the brittleness of software and the infeasibility of security metrics. IEEE Security and Privacy, 4(4), 96.
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.4
, pp. 96
-
-
Bellovin, S.S.1
-
9
-
-
85008047921
-
Software defect reduction top 10 list
-
Boehmand, B. W. and Basili, V. R. (2001). Software defect reduction top 10 list. IEEE Computer, 34(1), 135-137.
-
(2001)
IEEE Computer
, vol.34
, Issue.1
, pp. 135-137
-
-
Boehmand, B.W.1
Basili, V.R.2
-
10
-
-
34548159289
-
Empirical and statistical analysis of risk analysis-driven techniques for threat management
-
Los Alamitos, CA. IEEE Computer Society
-
Buyens, K., De Win, B., and Joosen, W. (2007). Empirical and statistical analysis of risk analysis-driven techniques for threat management. In The Second International Conference on Availability, Reliability and Security (ARES'07), pages 1034-1041, Los Alamitos, CA. IEEE Computer Society.
-
(2007)
The Second International Conference on Availability, Reliability and Security (ARES'07)
, pp. 1034-1041
-
-
Buyens, K.1
De Win, B.2
Joosen, W.3
-
11
-
-
85025335414
-
-
September), Technical report., Available at
-
MITRE Corporation. (2007, September). About CWE. Technical report. Available at http://cwe.mitre.org/about/index.html
-
(2007)
About CWE
-
-
-
12
-
-
85025374488
-
-
Technical report. Available at
-
MITRE Corporation. (2007). CWE List (Draft 7). Technical report. Available at http://cwe.mitre.org/data/index.html
-
(2007)
CWE List (Draft 7)
-
-
-
13
-
-
3042720722
-
Information security: Why the future belongs to the quants
-
Geer, D., Hoo, K.-S., and Jaquith, A. (2003). Information security: Why the future belongs to the quants. IEEE Security and Privacy, 1(4), 24-32.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 24-32
-
-
Geer, D.1
Hoo, K.-S.2
Jaquith, A.3
-
14
-
-
3042694356
-
Processes for producing secure software: Summary of us national cyber-security summit subgroup report
-
Davis, N., Humphrey, W., Redwine, S. T., Jr., Zibulski, G., and McGraw, G. (2004). Processes for producing secure software: Summary of us national cyber-security summit subgroup report. IEEE Security and Privacy, 2(3), 18-25.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 18-25
-
-
Davis, N.1
Humphrey, W.2
Redwine, S.T.3
Zibulski, G.4
McGraw, G.5
-
15
-
-
40249097816
-
Asasi: An environment for addressing software application security issues
-
Los Alamitos, CA. IEEE Computer Society
-
Essafi, M., Labed, L., and Ghezala, H. B. (2006). ASASI: An environment for addressing software application security issues. In International Conference on Systems and Networks Communications, p. 19, Los Alamitos, CA. IEEE Computer Society.
-
(2006)
International Conference on Systems and Networks Communications
, pp. 19
-
-
Essafi, M.1
Labed, L.2
Ghezala, H.B.3
-
16
-
-
77954726960
-
Engineering safety and security related requirements for software intensive systems
-
Los Alamitos, CA. IEEE Computer Society
-
Firesmith, D. G. (2007). Engineering safety and security related requirements for software intensive systems. In 29th International Conference on Software Engineering (ICSE'07Companion), p. 169, Los Alamitos, CA. IEEE Computer Society.
-
(2007)
29Th International Conference on Software Engineering (Icse'07companion)
, pp. 169
-
-
Firesmith, D.G.1
-
17
-
-
33846166742
-
The potential for underinvestment in internet security: Implications for regulatory policy
-
Garcia, A. and Horowitz, B. (2007, February). The potential for underinvestment in Internet security: Implications for regulatory policy. Journal of Regulatory Economics, 31(1), 37-55.
-
(2007)
Journal of Regulatory Economics
, vol.31
, Issue.1
, pp. 37-55
-
-
Garcia, A.1
Horowitz, B.2
-
18
-
-
38549162276
-
On the secure software development process: Clasp and sdl compared
-
Washington, DC, IEEE Computer Society
-
Gregoire, J., Buyens, K., De Win, B., Scandariato, R., and Joosen, W. (2007). On the secure software development process: CLASP and SDL compared. In SESS'07: Proceedings of the Third International Workshop on Software Engineering for Secure Systems, p. 1, Washington, DC, IEEE Computer Society.
-
(2007)
SESS'07: Proceedings of the Third International Workshop on Software Engineering for Secure Systems
, pp. 1
-
-
Gregoire, J.1
Buyens, K.2
De Win, B.3
Scandariato, R.4
Joosen, W.5
-
19
-
-
85008038652
-
Point/counterpoint
-
Hoglund, G. and McGraw, G. (2002). Point/counterpoint. IEEE Software, 19(6), 56-59.
-
(2002)
IEEE Software
, vol.19
, Issue.6
, pp. 56-59
-
-
Hoglund, G.1
McGraw, G.2
-
21
-
-
3042809894
-
Fourth quarter). Tangible roi through secure software engineering
-
Hoo, K.-S., Sudbury, A. W., and Jaquith, A. R. (2001, Fourth Quarter). Tangible ROI through secure software engineering. Secure Business Quarterly, 1(2).
-
(2001)
Secure Business Quarterly
, vol.1
, Issue.2
-
-
Hoo, K.-S.1
Sudbury, A.W.2
Jaquith, A.R.3
-
23
-
-
34547974467
-
Estimating software vulnerabilities
-
Jones, J. R. (2007). Estimating software vulnerabilities. IEEE Security and Privacy, 5(4), 28-32.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.4
, pp. 28-32
-
-
Jones, J.R.1
-
24
-
-
0004229237
-
-
PhD thesis, Purdue University, West Lafayette, IN
-
Krsul, I. V. (1998, May). Software vulnerability analysis. PhD thesis, Purdue University, West Lafayette, IN.
-
(1998)
Software Vulnerability Analysis
-
-
Krsul, I.V.1
-
25
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Landwehr, C. E., Bull, A. R., McDermott, J. P., and Choi, W. S. (1994). A taxonomy of computer program security flaws. ACM Computing Surveys, 26(3), 211-254.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
26
-
-
30344471832
-
Will proposed standards make mobile phones more secure?
-
Leavitt, N. (2005). Will proposed standards make mobile phones more secure? Computer, 38(12), 20-22.
-
(2005)
Computer
, vol.38
, Issue.12
, pp. 20-22
-
-
Leavitt, N.1
-
27
-
-
34547444679
-
-
July), Technical Report CMU-CS-05-1 55, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA
-
Manadhata, P. and Wing, J. M. (2005, July). An attack surface metric. Technical Report CMU-CS-05-1 55, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA.
-
(2005)
An Attack Surface Metric.
-
-
Manadhata, P.1
Wing, J.M.2
-
29
-
-
85025366062
-
-
November), NIST Workshop on Software Security Assurance Tools, Techniques, and Metrics
-
Martin, R. A., Christey, S. M., and Jarzombek, J. (2005, November). The case for common flaw enumeration. NIST Workshop on Software Security Assurance Tools, Techniques, and Metrics.
-
(2005)
The Case for Common Flaw Enumeration
-
-
Martin, R.A.1
Christey, S.M.2
Jarzombek, J.3
-
30
-
-
85008014461
-
Software assurance for security
-
McGraw, G. (1999). Software assurance for security. Computer, 32(4), 103-105.
-
(1999)
Computer
, vol.32
, Issue.4
, pp. 103-105
-
-
McGraw, G.1
-
31
-
-
2342581753
-
From the ground up: The dimacs software security workshop
-
McGraw, G. (2003). From the ground up: The DIMACS software security workshop. IEEE Security and Privacy, 1(2), 59-66.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 59-66
-
-
McGraw, G.1
-
32
-
-
2342469291
-
Software security
-
McGraw, G. (2004). Software security. IEEE Security and Privacy, 2(2), 80-83.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.2
, pp. 80-83
-
-
McGraw, G.1
-
33
-
-
33144456824
-
Software security: Building security
-
Upper Saddle River, NJ: Addison- Wesley
-
McGraw, G. (2006). Software security: Building security. In: Addison- Wesley Software Security Series. Upper Saddle River, NJ: Addison- Wesley, pp.13-37, 277-298.
-
(2006)
Addison- Wesley Software Security Series.
-
-
McGraw, G.1
-
35
-
-
34047178394
-
A metrics framework to drive application security improvement
-
Nichols, E. A. and Peterson, G. (2007). A metrics framework to drive application security improvement. IEEE Security and Privacy, 5(2), 88-91.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 88-91
-
-
Nichols, E.A.1
Peterson, G.2
-
36
-
-
0005914572
-
-
National Institute of Standards and Technology. Retrieved January 12, 2009 from
-
NIST. National Vulnerability Database (NVD). (2007). Technical report, National Institute of Standards and Technology. Retrieved January 12, 2009 from http://nvd.nist. gov/statistics.cfm
-
(2007)
Technical Report
-
-
-
40
-
-
0018683804
-
Encryption and secure computer networks
-
Popek, G. P. and Kline, C. S. (1979). Encryption and secure computer networks. ACM Computing Surveys, 11(4), 331-356.
-
(1979)
ACM Computing Surveys
, vol.11
, Issue.4
, pp. 331-356
-
-
Popek, G.P.1
Kline, C.S.2
-
41
-
-
0005914572
-
-
Common Criteria Portal. CC-Common Criteria. (2007). Technical report. Available at http://www.commoncriteriaportal.org/public/developer/ index.php?menu=2
-
(2007)
Technical Report
-
-
-
42
-
-
15944399929
-
(
-
Proceedings of the Fifth Annual IEEE SMC, June
-
Sachitano, A., Chapman, R. O., and Hamilton, J. A. (2004). Security in software architecture: A case study. In: Information Assurance Workshop, Proceedings of the Fifth Annual IEEE SMC, June, pages 370-376.
-
(2004)
Information Assurance Workshop
, pp. 370-376
-
-
Sachitano, A.1
Chapman, R.O.2
Hamilton, J.A.3
-
43
-
-
0036470012
-
Body of knowledge for software quality measurement
-
Schneidewind, N. F. (2002). Body of knowledge for software quality measurement. Computer, 35(2), 77-83.
-
(2002)
Computer
, vol.35
, Issue.2
, pp. 77-83
-
-
Schneidewind, N.F.1
-
44
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
January
-
Sindre, G., and Opdahl, A. L. (2005, January). Eliciting security requirements with misuse cases. Requirements Engineering, 10(1), 34-44.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
45
-
-
48049121269
-
Security evaluation for information assurance
-
Los Alamitos, CA, IEEE Computer Society
-
Kim, Y., Park, G., Kim, T., and Lee, S. (2007). Security evaluation for information assurance. In: The 2007 International Conference on Computational Science and its Applications, pp 227-230, Los Alamitos, CA, IEEE Computer Society.
-
(2007)
The 2007 International Conference on Computational Science and Its Applications
, pp. 227-230
-
-
Kim, Y.1
Park, G.2
Kim, T.3
Lee, S.4
-
46
-
-
30344442772
-
Seven pernicious kingdoms: A taxonomy of software security errors
-
Tsipenyuk, K., Chess, B., and McGraw, G. (2005). Seven pernicious kingdoms: A taxonomy of software security errors. IEEE Security and Privacy, 3(6), 81-84.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.6
, pp. 81-84
-
-
Tsipenyuk, K.1
Chess, B.2
McGraw, G.3
-
47
-
-
0005914572
-
-
US-CERT: United States Computer Emergency Readiness Team. Retrieved January 12, 2009 from
-
US-CERT. US-CERT Vulnerability Notes Database. (2007). Technical report, US-CERT: United States Computer Emergency Readiness Team. Retrieved January 12, 2009 from http://www.kb.cert.org/vuls/
-
(2007)
Technical Report
-
-
-
48
-
-
27644524446
-
Bridging the gap between software development and information security
-
van Wyk, K. R. and McGraw, G. (2005). Bridging the gap between software development and information security. IEEE Security and Privacy, 3(5), 75-79.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 75-79
-
-
Van Wyk, K.R.1
McGraw, G.2
-
49
-
-
84870365725
-
Essential factors for successful software security awareness training
-
van Wyk, K. R. and Steven, J. (2006). Essential factors for successful software security awareness training. IEEE Security and Privacy, 4(5), 80-83.
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.5
, pp. 80-83
-
-
Van Wyk, K.R.1
Steven, J.2
-
50
-
-
4344569744
-
Risk analysis in software design
-
Verdon, D. and McGraw, G. (2004). Risk analysis in software design. IEEE Security and Privacy, 2(4), 79-84.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 79-84
-
-
Verdon, D.1
McGraw, G.2
-
51
-
-
85016660264
-
Token-based scanning of source code for security problems
-
Viega, J., Bloch, J. T., Kohno, T., and McGraw, G. (2002). Token-based scanning of source code for security problems. ACM Transactions on Information Systems Security, 5(3), 238-261.
-
(2002)
ACM Transactions on Information Systems Security
, vol.5
, Issue.3
, pp. 238-261
-
-
Viega, J.1
Bloch, J.T.2
Kohno, T.3
McGraw, G.4
-
52
-
-
2942628542
-
-
Technical report, Citigal, Dulles, VA. Available at
-
Viega, J., Bloch, J. T., Kohno, T., and McGraw, G. (2000). ITS4: A static vulnerability scanner for C and C++ code. Technical report, Citigal, Dulles, VA. Available at http://www.cigital.com/papers/download/ its4.pdf
-
(2000)
ITS4: A Static Vulnerability Scanner for C and C++ Code.
-
-
Viega, J.1
Bloch, J.T.2
Kohno, T.3
McGraw, G.4
-
54
-
-
3042826627
-
A call to action: Look beyond the horizon
-
Wing, J. M. (2003). A call to action: Look beyond the horizon. IEEE Security and Privacy, 1(6). 62-67.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.6
, pp. 62-67
-
-
Wing, J.M.1
-
55
-
-
33846588652
-
-
Technical Report (CMU/SEI-2004-TN-045, ADA431118), Software Engineering Institute, Carnegie Mellon University Pittsburgh, PA. Available at
-
Xie, N., Mead, N., Chen, P., Dean, M., Lopez, L., Ojoko-Adams, D., and Osman, H. (2004). Square project: Cost/bene?t analysis framework for information security improvement projects in small companies. Technical Report (CMU/SEI-2004-TN-045, ADA431118), Software Engineering Institute, Carnegie Mellon University Pittsburgh, PA. Available at http://www.sei.cmu.edu/publications/documents/04. reports/04tn045.html
-
(2004)
Square Project: Cost/Bene?T Analysis Framework for Information Security Improvement Projects in Small Companies
-
-
Xie, N.1
Mead, N.2
Chen, P.3
Dean, M.4
Lopez, L.5
Ojoko-Adams, D.6
Osman, H.7
-
56
-
-
20344363200
-
Testing static analysis tools using exploitable buffer over?Ows from open source code
-
ACM Press, New York
-
Zitser, M., Lippmann, R., and Leek, T. (2004). Testing static analysis tools using exploitable buffer over?ows from open source code. In: SIGSOFT '04/FSE-12: Proceedings of the 12th ACMSIGSOFT International Symposium on Foundations of Software Engineering, ACM Press, New York, pp. 97-106.
-
(2004)
SIGSOFT '04/FSE-12: Proceedings of the 12Th ACMSIGSOFT International Symposium on Foundations of Software Engineering
, pp. 97-106
-
-
Zitser, M.1
Lippmann, R.2
Leek, T.3
|