-
2
-
-
84858741061
-
One technique is not enough: A comparison of vulnerability discovery techniques
-
AUSTIN, A., and WILLIAMS, L. One technique is not enough: A comparison of vulnerability discovery techniques. In Empirical Software Engineering and Measurement (ESEM), 2011 International Symposium on (2011), IEEE, pp. 97-106.
-
(2011)
Empirical Software Engineering and Measurement (ESEM), 2011 International Symposium on
, pp. 97-106
-
-
Austin, A.1
Williams, L.2
-
4
-
-
70349120464
-
-
Team, T. G. C. Tech. rep., Stanford University
-
BARTH, A., JACKSON, C., REIS, C., and TEAM, T. G. C. The Security Architecture of the Chromium Browser. Tech. rep., Stanford University, 2008.
-
(2008)
The Security Architecture of the Chromium Browser
-
-
Barth, A.1
Jackson, C.2
Reis, C.3
-
5
-
-
84886227624
-
Why people choose negative expected return assets - An empirical examination of a utility theoretic explanation
-
March
-
BHATTACHARYYA, N., and GARRETT, T. A. Why People Choose Negative Expected Return Assets - An Empirical Examination of a Utility Theoretic Explanation. Federal Reserve Bank of St. Louis Working Paper Series (March 2006). http://research.stlouisfed.org/wp/2006/2006-014.pdf.
-
(2006)
Federal Reserve Bank of St. Louis Working Paper Series
-
-
Bhattacharyya, N.1
Garrett, T.A.2
-
7
-
-
84964877261
-
-
June
-
BUCHANAN, K., EVANS, C., REIS, C., and SEPEZ, T. A Tale of Two Pwnies (Part 2), June 2012. http://blog.chromium.org/2012/06/tale-of-two-pwnies-part-2.html.
-
(2012)
A Tale of Two Pwnies (Part 2)
-
-
Buchanan, K.1
Evans, C.2
Reis, C.3
Sepez, T.4
-
8
-
-
85076283537
-
-
January
-
BUCHANAN, K., EVANS, C., REIS, C., and SEPEZ, T. Show off Your Security Skills: Pwn2Own and Pwnium 3, January 2013. http://blog.chromium.org/2013/01/show-off-your-security-skills-pwn2own.html.
-
(2013)
Show off Your Security Skills: Pwn2Own and Pwnium 3
-
-
Buchanan, K.1
Evans, C.2
Reis, C.3
Sepez, T.4
-
9
-
-
85076304626
-
No more free bugs
-
October
-
CARETTONI, L. "No More Free Bugs" Initiative, October 2011. http://blog.nibblesec.org/2011/10/no-more-free-bugs-initiatives.html.
-
(2011)
Initiative
-
-
Carettoni, L.1
-
10
-
-
60249092995
-
A systematic review of software fault prediction studies
-
CATAL, C., and DIRI, B. A systematic review of software fault prediction studies. Expert Systems with Applications 36, 4 (2009), 7346-7354.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.4
, pp. 7346-7354
-
-
Catal, C.1
Diri, B.2
-
16
-
-
84901451345
-
-
Defense in Depth. http://www.nsa.gov/ia/_files/support/defenseindepth.pdf.
-
Defense in Depth
-
-
-
17
-
-
85076288829
-
-
April
-
MozillaWiki: Electrolysis, April 2011. https://wiki.mozilla.org/Electrolysis.
-
(2011)
MozillaWiki: Electrolysis
-
-
-
18
-
-
84937682811
-
An empirical study on the effectiveness of security code review
-
March
-
EDMUNDSON, A., HOLTKAMP, B., RIVERA, E., FINIFTER, M., METTLER, A., and WAGNER, D. An Empirical Study on the Effectiveness of Security Code Review. In Proceedings of the International Symposium on Engineering Secure Software and Systems (March 2013).
-
(2013)
Proceedings of the International Symposium on Engineering Secure Software and Systems
-
-
Edmundson, A.1
Holtkamp, B.2
Rivera, E.3
Finifter, M.4
Mettler, A.5
Wagner, D.6
-
21
-
-
85076280472
-
-
EVANS, C. Personal Communication, March 2013
-
EVANS, C. Personal Communication, March 2013.
-
-
-
-
22
-
-
85000740018
-
-
Team G. S. July
-
EVANS, C., GROSSE, E., MEHTA, N., MOORE, M., ORMANDY, T., TINNES, J., ZALEWSKI, M., and TEAM, G. S. Rebooting Responsible Disclosure: a focus on protecting end users, July 2010. http://googleonlinesecurity.blogspot.com/2010/07/rebooting-responsible-disclosure-focus.html.
-
(2010)
Rebooting Responsible Disclosure: A Focus on Protecting end Users
-
-
Evans, C.1
Grosse, E.2
Mehta, N.3
Moore, M.4
Ormandy, T.5
Tinnes, J.6
Zalewski, M.7
-
28
-
-
85076298531
-
-
January
-
GORENC, B. Pwn2Own 2013, January 2013. http://dvlabs.tippingpoint.com/blog/2013/01/17/pwn2own-2013.
-
(2013)
Pwn2Own 2013
-
-
Gorenc, B.1
-
30
-
-
85076292204
-
-
HOFMANN, C. Personal Communication, March 2013
-
HOFMANN, C. Personal Communication, March 2013.
-
-
-
-
37
-
-
84869472047
-
The legitimate vulnerability market: The secretive world of 0-day exploit sales
-
MILLER, C. The legitimate vulnerability market: the secretive world of 0-day exploit sales. In WEIS (2007).
-
(2007)
WEIS
-
-
Miller, C.1
-
42
-
-
85019210843
-
Software security economics: Theory, in practice
-
NEUHAUS, S., and PLATTNER, B. Software security economics: Theory, in practice. In WEIS (2012).
-
(2012)
WEIS
-
-
Neuhaus, S.1
Plattner, B.2
-
43
-
-
67249126825
-
Predicting vulnerable software components
-
NEUHAUS, S., ZIMMERMANN, T., HOLLER, C., and ZELLER, A. Predicting vulnerable software components. In Proceedings of the 14th ACM conference on Computer and communications security (2007), ACM, pp. 529-540.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
44
-
-
85076283624
-
-
National Vulnerability Database. http://nvd.nist.gov/.
-
-
-
-
46
-
-
85076320570
-
-
Understanding Operational Security. http://www.cisco.com/web/about/security/intelligence/opsecurity.html.
-
-
-
-
48
-
-
0003975626
-
-
1st ed. O'Reilly & Associates, Inc., Sebastopol, CA, USA
-
RAYMOND, E. S. The Cathedral and the Bazaar, 1st ed. O'Reilly & Associates, Inc., Sebastopol, CA, USA, 1999.
-
(1999)
The Cathedral and the Bazaar
-
-
Raymond, E.S.1
-
49
-
-
14744276335
-
Is finding security holes a good idea?
-
RESCORLA, E. Is finding security holes a good idea? IEEE Security & Privacy 3, 1 (2005), 14-19.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 14-19
-
-
Rescorla, E.1
-
52
-
-
84857087304
-
Quo vadis? A study of the evolution of input validation vulnerabilities in web applications
-
SCHOLTE, T., BALZAROTTI, D., and KIRDA, E. Quo vadis? a study of the evolution of input validation vulnerabilities in web applications. Financial Cryptography and Data Security (2012), 284-298.
-
(2012)
Financial Cryptography and Data Security
, pp. 284-298
-
-
Scholte, T.1
Balzarotti, D.2
Kirda, E.3
-
54
-
-
85076314308
-
-
June
-
THE BLUEHAT TEAM. Microsoft Security Bounty Programs. http://www.microsoft.com/security/msrc/report/bountyprograms.aspx, June 2013.
-
(2013)
Microsoft Security Bounty Programs
-
-
-
56
-
-
85076282658
-
-
VEDITZ, D. Personal Communication, February 2013
-
VEDITZ, D. Personal Communication, February 2013.
-
-
-
-
57
-
-
85076324800
-
-
September
-
Vulnerability Remediation, September 2010. https://www.cert.org/vuls/remediation.html.
-
(2010)
Vulnerability Remediation
-
-
|