2008 Frontiers of Software Maintenance 2008
DOI: 10.1109/fosm.2008.4659254
|View full text |Cite
|
Sign up to set email alerts
|

Software analysis for security

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…To overcome common errors regarding string and integer manipulation in C/C++, alternate solutions are available [59]. Te most common vulnerabilities arising from coding problems in C language are bufer overfow, format string vulnerabilities, and integer vulnerabilities [60].…”
Section: Security Implementation Implementation Begins Withmentioning
confidence: 99%
“…To overcome common errors regarding string and integer manipulation in C/C++, alternate solutions are available [59]. Te most common vulnerabilities arising from coding problems in C language are bufer overfow, format string vulnerabilities, and integer vulnerabilities [60].…”
Section: Security Implementation Implementation Begins Withmentioning
confidence: 99%
“…He stresses that it is necessary to develop formal notations and tools to allow the specification of softwaresecurity architectures. Mancoridis assumes that the developer has the security architecture of her software in her mind, what is not necessarily the case [13].…”
Section: Related Workmentioning
confidence: 99%
“…One conclusion that we drew from our security review is that it is necessary to create more formal architectural security views (see also Mancoridis' statement [13]). These views need to be language-and platform-independent in order to be a common language to communicate with security experts who are not necessarily experts for the programming language.…”
Section: Software-security Comprehensionmentioning
confidence: 99%
“…Static tools like FlawFinder exist to evaluate source code and dynamic tools are also available to highlight vulnerabilities in the run-time environment. Reviewing these results alongside standard testing procedures like white-box and black-box techniques help uncover and resolve code weaknesses (Mancoridis, 2008).…”
Section: Knowledge Gained and Artifacts Producedmentioning
confidence: 99%