Back to Results
First PageMeta Content
Software testing / Software bugs / Computer network security / Hacking / Coverity / Vulnerability / Application security / Social vulnerability / Fortify Software / Cyberwarfare / Computer security / Software quality


Manual vs. Automated Vulnerability Assessment: A Case Study James A. Kupsch and Barton P. Miller Computer Sciences Department, University of Wisconsin, Madison, WI, USA {kupsch,bart}@cs.wisc.edu Abstract
Add to Reading List

Document Date: 2009-06-01 10:19:43


Open Document

File Size: 127,65 KB

Share Result on Facebook

Company

Red Hat / Microsoft / /

/

Event

Product Issues / /

Facility

building Condor / University of Wisconsin / /

IndustryTerm

web interface / software system / serious software project / large systems / security audit / tool chain / secure systems / search focuses / software assessment tools / automated source code vulnerability assessment tools / software / software development team / software security / automated tools / automated source code analysis tools / checkpoint server / distributed networks / helper applications / information gathering tool / /

OperatingSystem

Scientific Linux / GNU / /

Organization

Barton P. Miller Computer Sciences Department / University of Wisconsin / Madison / University of Wisconsin / /

Person

James A. Kupsch / Miller More / Barton P. Miller / /

Position

security analyst / analyst / experienced analyst / /

Product

Off-by-One Command Injection / Coverity / Fortify / Condor / way / /

ProvinceOrState

Wisconsin / /

PublishedMedium

Condor / the Condor / /

Technology

Linux / API / Process Control / /

SocialTag