Secure coding

Results: 94



#Item
31Coccinelle: Tool support for automated CERT C Secure Coding Standard certificationI Mads Chr. Olesena , Ren´e Rydhof Hansena,∗, Julia L. Lawallb , Nicolas Palixb a Department of Computer Science, Aalborg University, S

Coccinelle: Tool support for automated CERT C Secure Coding Standard certificationI Mads Chr. Olesena , Ren´e Rydhof Hansena,∗, Julia L. Lawallb , Nicolas Palixb a Department of Computer Science, Aalborg University, S

Add to Reading List

Source URL: people.cs.aau.dk

Language: English - Date: 2013-06-14 08:33:39
32Document: WG 14/N1668 Title: Comment on N1663 - TSC Secure Coding Rules Date: Author: Willem Wakker

Document: WG 14/N1668 Title: Comment on N1663 - TSC Secure Coding Rules Date: Author: Willem Wakker

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2013-03-24 08:15:12
33Document	
  WG	
  14/N1667	
   Date:	
  2012-­‐12-­‐05	
   Secure	
  C	
  coding	
  rules,	
  introductory	
  words	
   	
   These	
  rules	
  may	
  have	
  three	
  uses,	
  as:	
  

Document  WG  14/N1667   Date:  2012-­‐12-­‐05   Secure  C  coding  rules,  introductory  words     These  rules  may  have  three  uses,  as:  

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2013-03-24 08:15:12
34White Paper  Secure Coding for Android Applications  White Paper

White Paper Secure Coding for Android Applications White Paper

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-27 15:40:45
35White Paper  Secure Coding for Android Applications  White Paper

White Paper Secure Coding for Android Applications White Paper

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-27 15:40:45
36Product Overview Software Technology LDRArules™ Increases Visibility for Software Standards Compliance and Security Vulnerabilities

Product Overview Software Technology LDRArules™ Increases Visibility for Software Standards Compliance and Security Vulnerabilities

Add to Reading List

Source URL: www.coressentinc.com

Language: English - Date: 2013-08-16 12:03:00
37The CRIME attack  HTTPS:// Secure HTTP HTTPS provides: ● Confidentiality (Encryption), ● Integrity (Message Authentication Code),

The CRIME attack HTTPS:// Secure HTTP HTTPS provides: ● Confidentiality (Encryption), ● Integrity (Message Authentication Code),

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2012-09-26 10:02:07
38The 7th International Common Criteria Conference, 19-21 September, Lanzarote, Spain 20 September, Track 3, 11:00-11:30 am Software Security Reviews - Summarized experiences that led to a new methodology.

The 7th International Common Criteria Conference, 19-21 September, Lanzarote, Spain 20 September, Track 3, 11:00-11:30 am Software Security Reviews - Summarized experiences that led to a new methodology.

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:31
39Clang and Coccinelle: Synergising program analysis tools for CERT C Secure Coding Standard certification Mads Chr. Olesen1 , Ren´e Rydhof Hansen1 , Julia L. Lawall2 , Nicolas Palix2 1 rrh,,  http://www.cs

Clang and Coccinelle: Synergising program analysis tools for CERT C Secure Coding Standard certification Mads Chr. Olesen1 , Ren´e Rydhof Hansen1 , Julia L. Lawall2 , Nicolas Palix2 1 rrh,, http://www.cs

Add to Reading List

Source URL: pagesperso-systeme.lip6.fr

Language: English - Date: 2011-12-17 11:25:19
40Cryptanalysis of Secure Message Transmission Protocols with Feedback (Full version of the ICITS 2009 paper with the same title and authors) Qiushi Yang1,? and Yvo Desmedt1,2,?? 1

Cryptanalysis of Secure Message Transmission Protocols with Feedback (Full version of the ICITS 2009 paper with the same title and authors) Qiushi Yang1,? and Yvo Desmedt1,2,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-21 09:52:54