Security bug

Results: 244



#Item
51Management / Survival kit / Disaster / United States Department of Homeland Security / Bug-out bag / Pet Emergency Management / Disaster preparedness / Public safety / Emergency management

2014 Theme: “Be Disaster Aware, Take Action and Prepare.” Learn How to…Reconnect with Family After Disaster. Know How to…Plan for Specific Needs Before a Disaster. Learn How to…Build an Emergency Kit. Learn How

Add to Reading List

Source URL: www.burleighco.com

Language: English - Date: 2014-08-25 17:07:05
52Software review / Coverity / FindBugs / Software bug / Jtest / Parasoft / Application security / Software design pattern / Code review / Software testing / Software / Computing

Comparing Four Static Analysis Tools for Java Concurrency Bugs Md. Abdullah Al Mamun, Aklima Khanam, Håkan Grahn, and Robert Feldt School of Computing, Blekinge Institute of Technology SE[removed]Karlskrona, Sweden

Add to Reading List

Source URL: robertfeldt.net

Language: English - Date: 2010-12-03 02:49:28
53Computer security / Crime prevention / Computer network security / Data security / Vulnerability / Information security / Software bug / Threat / Security / National security / Cyberwarfare

2004 Information Security Incident Survey Report ver.1.1 Information Disclosure: Projected Legal Reparations and

Add to Reading List

Source URL: www.jnsa.org

Language: English - Date: 2006-11-04 23:20:43
54Computing / Cryptographic software / OpenSSL / Exploit / Virtual private network / Vulnerability / Computer security / Computer network security / Cyberwarfare

Heartbleed Compromise Assessment Service So, you’ve patched the OpenSSL Heartbleed bug, but what if you’ve already been compromised? The world became aware of a particularly nasty bug in OpenSSL’s TLS/DTLS Heartbea

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2014-08-03 16:14:12
55Computer network security / Computer security / Hacking / Vulnerability / Application security / Firefox / Penetration test / Social vulnerability / Software bug / Software / Computing / Software testing

Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities Matthew Finifter

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English
56Computing / Computer-mediated communication / Anti-spam techniques / Phishing / Web bug / Malware / Attachment theory / Spam / Spamming / Internet / Email

Research Report on IT Security Inoculation FY2009

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2013-05-01 02:40:02
57Data types / Software bug / Linux kernel / Kernel / Linux / Pointer / Programming language / Type inference / Computing / Software / Type theory

Verifying Security Properties using Type-Qualifier Inference by Robert Timothy Johnson B.S. (University of North Carolina at Greensboro[removed]A dissertation submitted in partial satisfaction

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
58Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
59Software testing / Sandbox / Computer security / Google Chrome / Vulnerability / Seccomp / JavaScript / Software bug / Interpreter / Software / Computing / System software

Exploring compartmentalisation hypotheses with SOAAP Khilan Gudka∗ , Robert N. M. Watson∗ , Steven Hand∗ , Ben Laurie† and Anil Madhavapeddy∗ ∗ University of Cambridge - [removed] † Google UK

Add to Reading List

Source URL: anil.recoil.org

Language: English - Date: 2013-09-29 14:14:18
60Object-oriented programming / Model checking / Software bug / Class / JavaScript / Software engineering / Computer programming / Computing

Model Checking An Entire Linux Distribution for Security Violations by Benjamin W. Schwarz Research Project Submitted to the Department of Electrical Engineering and Computer Sciences,

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
UPDATE