Security testing

Results: 3214



#Item
791Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
792Security testing / Public safety / Prevention / Computer security / Security / Information security

FedRAMP_infographic15 - print

Add to Reading List

Source URL: www.brightline.com

Language: English - Date: 2014-10-31 15:03:47
793Computer network security / Hacking / Software testing / National security / Secure communication / Vulnerability / Exploit / Password / Markov decision process / Cyberwarfare / Computer security / Statistics

Towards Modelling Adaptive Attacker’s Behaviour⋆ Leanid Krautsevich1 , Fabio Martinelli2 , and Artsiom Yautsiukhin2 1 2

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2012-10-09 09:04:02
794Computer network security / Software testing / Rapid7 / Metasploit Project / Vulnerability management / Vulnerability / Software / Computer security / System software

Industry: Security Website: s3security.com CHALLENGE: As a Managed Security Service Provider, S3 needs to offer

Add to Reading List

Source URL: www.rapid7.com

Language: English
795Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
796Software testing / Software metrics / Hacking / Vulnerability / Software quality / Firefox / Debian / Computer security / Google Chrome OS / Software / Computing / Computer network security

Secure Open Source Collaboration: An Empirical Study of Linus’ Law Andrew Meneely and Laurie Williams North Carolina State University Department of Computer Science, Raleigh, North Carolina, USA

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2009-08-28 08:56:45
797Evaluation / Computer security / Computer network security / Quality assurance / Software assurance / Vulnerability / Software security assurance / Penetration test / Application security / Software testing / Software quality / Cyberwarfare

Software Assurance Metrics And Tool Evaluation Las Vegas, Nevada, USA, June 27-30, 2005 P. E. Black Information Technology Laboratory

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:58
798Computer network security / Software testing / Rapid7 / Hacking / Vulnerability management / Social vulnerability / Vulnerability / Metasploit Project / Computer security / Software / System software

Nexpose Certified Administrator: Introduction to Nexpose What is it? Are you a security professional that doesn’t quite know where to begin getting an understanding of what kind of devices are in your environment, or h

Add to Reading List

Source URL: www.rapid7.com

Language: English
799Software testing / Sandbox / Computer security / Google Chrome / Vulnerability / Seccomp / JavaScript / Software bug / Interpreter / Software / Computing / System software

Exploring compartmentalisation hypotheses with SOAAP Khilan Gudka∗ , Robert N. M. Watson∗ , Steven Hand∗ , Ben Laurie† and Anil Madhavapeddy∗ ∗ University of Cambridge - [removed] † Google UK

Add to Reading List

Source URL: anil.recoil.org

Language: English - Date: 2013-09-29 14:14:18
800Politics of Hong Kong / Security / Genetic testing / Identity document / Immigration Department / Hong Kong Special Administrative Region passport / Hong Kong law / Hong Kong / Government

Information Leaflet on Genetic Test Arrangements for Verification of Parentage When is genetic test applicable A person applying for a Certificate of Entitlement, whether born within or out of wedlock, has to submit evid

Add to Reading List

Source URL: www.immd.gov.hk

Language: English - Date: 2015-03-06 22:39:34
UPDATE