Software security assurance

Results: 433



#Item
21

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection Tielei Wang1,2 , Tao Wei1,2 , Guofei Gu3 , Wei Zou1,2∗ Laboratory of Network and Software Security Assurance (Peking Uni

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2010-03-05 09:52:30
    22Cyberwarfare / Computer security / Security / Computer network security / Software testing / Software bugs / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack

    Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

    Add to Reading List

    Source URL: adam.shostack.org

    Language: English - Date: 2014-06-11 11:49:30
    23Prevention / Computing / Safety / Computer network security / Software quality / Safety engineering / Dependability / Quality / Computer security / Security / Threat / Reliability engineering

    ASSURE 2015: The 3rd International Workshop on Assurance Cases for Software-Intensive Systems Workshop Programme September 22, 2015 Delft, The Netherlands Tuesday, 22nd September 2015

    Add to Reading List

    Source URL: safecomp2015.tudelft.nl

    Language: English - Date: 2015-09-14 10:24:36
    24

    Software Assurance Implementing an SA Program at a Security Software Company Mark S. Kadrich, CISSP Senior Principle, End Point Protection

    Add to Reading List

    Source URL: sysa.omg.org

    Language: English - Date: 2009-01-26 14:44:40
      25Software quality / Quality assurance / Software assurance / Process management / IEEE standards / Management / Concept of operations / Vulnerability / Computer security / Critical infrastructure protection

      Mitch.Komaroff.CONOPS Nov 06 Overview.ppt

      Add to Reading List

      Source URL: swa.omg.org

      Language: English - Date: 2006-12-14 08:55:32
      26Computer security / Evaluation / Security / Crime prevention / Software quality / Data security / Evaluation Assurance Level / Common Criteria / Software assurance / Protection Profile / Validation / National Information Assurance Partnership

      Sumeet.Malhotra.Software Assurance Challenges for Systems Integrators.ppt

      Add to Reading List

      Source URL: swa.omg.org

      Language: English - Date: 2006-12-14 08:55:14
      27Software testing / Software quality / Hacking / Computer network security / Vulnerability / Veracode / Software assurance / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

      Being Explicit about Security Weaknesses

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2007-07-02 14:31:33
      28Cross-platform software / Evaluation / Software testing / Data security / Common Criteria / Kernel / SQL / Evaluation Assurance Level / Cross-site scripting / Computing / Software engineering / Computer security

      Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

      Add to Reading List

      Source URL: atsec.com

      Language: English - Date: 2010-08-10 10:53:40
      29Evaluation / Common Criteria / Evaluation Assurance Level / Red Hat Enterprise Linux / Security Target / Protection Profile / Linux kernel / Linux / Red Hat / Computer security / Computing / Software

      Microsoft Word - HP_RHEL4_security_target-v2.4.doc

      Add to Reading List

      Source URL: www.niap-ccevs.org

      Language: English - Date: 2009-10-08 10:40:04
      30Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

      Microsoft Word - BeingExplicit_WP.doc

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2007-07-02 14:11:15
      UPDATE