A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Java security: Web browsers and beyond
Internet besieged
Securing Java: getting down to business with mobile code
Securing Java: getting down to business with mobile code
Software Inspection
Software Assurance for Security
Computer
ITS4: A static vulnerability scanner for C and C++ code
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
From the Ground Up: The DIMACS Software Security Workshop
IEEE Security and Privacy
Towards agile security assurance
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Common Criteria Approach to J2ME CLDC Security Requirements
Proceedings of the 2006 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06
AnZenMail: a secure and certified e-mail system
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Hi-index | 0.00 |
Developers and users require some degree of assurance in their applications' security vulnerabilities. The authors have designed a prototype tool, Jslint, to help programmers automatically use existing security knowledge.