Identifying fault-prone files using static analysis alerts through singular value decomposition
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
Securing Java code: heuristics and an evaluation of static analysis tools
Proceedings of the 2008 workshop on Static analysis
Security benchmarking using partial verification
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Application security code analysis: a step towards software assurance
International Journal of Information and Computer Security
Mutation-based testing of integer overflow vulnerabilities
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Towards security testing with taint analysis and genetic algorithms
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Automatic construction of an effective training set for prioritizing static analysis warnings
Proceedings of the IEEE/ACM international conference on Automated software engineering
Information and Software Technology
Software security aspects of Java-based mobile phones
Proceedings of the 2011 ACM Symposium on Applied Computing
Model checking dataflow for malicious input
WESS '11 Proceedings of the Workshop on Embedded Systems Security
ASIDE: IDE support for web application security
Proceedings of the 27th Annual Computer Security Applications Conference
Evaluating interactive support for secure programming
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A study on improving static analysis tools: why are we not using them?
Proceedings of the 34th International Conference on Software Engineering
An historical examination of open source releases and their vulnerabilities
Proceedings of the 2012 ACM conference on Computer and communications security
Why don't software developers use static analysis tools to find bugs?
Proceedings of the 2013 International Conference on Software Engineering
Teaching Secure Coding Practices to STEM Students
Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
Information and Software Technology
Software trustworthiness 2.0-A semantic web enabled global source code analysis approach
Journal of Systems and Software
Hi-index | 0.00 |
The First Expert Guide to Static Analysis for Software Security!Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there's a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers.Coverage includes:脗 Why conventional bug-catching often misses security problems脗 How static analysis can help programmers get security right脗 The critical attributes and algorithms that make or break a static analysis tool脗 36 techniques for making static analysis more effective on your code脗 More than 70 types of serious security vulnerabilities, with specific solutions脗 Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more脗 Techniques for handling untrusted input脗 Eliminating buffer overflows: tactical and strategic approaches脗 Avoiding errors specific to Web applications, Web services, and Ajax脗 Security-aware logging, debugging, and error/exception handling脗 Creating, maintaining, and sharing secrets and confidential information脗 Detailed tutorials that walk you through the static analysis process“We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software.”ï戮聳Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language“'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know.”ï戮聳David Wagner, Associate Professor, University of California Berkeley“Software developers are the first and best line of defense for the security of their code. This book gives them the security development knowledge and the tools they need in order to eliminate vulnerabilities before they move into the final products that can be exploited.”ï戮聳Howard A. Schmidt, Former White House Cyber Security AdvisorBRIAN CHESS is Founder and Chief Scientist of Fortify Software, where his research focuses on practical methods for creating secure systems. He holds a Ph.D. in Computer Engineering from University of California Santa Cruz, where he studied the application of static analysis to finding security-related code defects.JACOB WEST manages Fortify Software's Security Research Group, which is responsible for building security knowledge into Fortify's products. He brings expertise in numerous programming languages, frameworks, and styles together with deep knowledge about how real-world systems fail.CD contains a working demonstration version of Fortify Software's Source Code Analysis (SCA) product; extensive Java and C code samples; and the tutorial chapters from the book in PDF format.Part I: Software Security and Static Analysisï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 1 1ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 The Software Security Problemï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 3 2ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Introduction to Static Analysis 21 3ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Static Analysis as Part of the Code Review Processï戮 ï戮 ï戮 47 4ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Static Analysis Internalsï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 71Part II: Pervasive Problemsï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 115 5ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Handling Input 117 6ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Buffer Overflowï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 175 7ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Bride of Buffer Overflowï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 235 8ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Errors and Exceptionsï戮 265Part III: Features and Flavorsï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 295 9ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Web Applicationsï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 297 10ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 XML and Web Servicesï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 349 11ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Privacy and Secretsï戮 ï戮 ï戮 ï戮 379 12ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Privileged Programsï戮 ï戮 ï戮 421Part IV: Static Analysis in Practiceï戮 457 13ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Source Code Analysis Exercises for Javaï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 459 14ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Source Code Analysis Exercises for C 503 Epilogueï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 541Referencesï戮 ï戮 ï戮 ï戮 ï戮 545Indexï戮 ï戮 559