Why functional programming matters
The Computer Journal - Special issue on Lazy functional programming
Software engineering (6th ed.)
Software engineering (6th ed.)
C: The Complete Reference
Algorithms; A Functional Programming Approach
Algorithms; A Functional Programming Approach
Linux Programming Unleashed with CD-ROM
Linux Programming Unleashed with CD-ROM
Programming Languages: Principles and Practice
Programming Languages: Principles and Practice
Software Engineering: A Practitioner's Approach
Software Engineering: A Practitioner's Approach
Hacking Exposed
Writing Secure Code
MOPS: an infrastructure for examining security properties of software
Proceedings of the 9th ACM conference on Computer and communications security
Introduction to Functional Programming
Introduction to Functional Programming
Revised Report on the Algorithmic Language Scheme
Higher-Order and Symbolic Computation
Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Secure Programming Cookbook for C and C++
Secure Programming Cookbook for C and C++
Static analysis of anomalies and security vulnerabilities in executable files
Proceedings of the 44th annual Southeast regional conference
Security trumps efficiency: putting it into the curriculum
Journal of Computing Sciences in Colleges
InfoSec technology management of user space and services through security threat gateways
Proceedings of the 4th annual conference on Information security curriculum development
Impact of inheritance on vulnerability propagation at design phase
ACM SIGSOFT Software Engineering Notes
A vulnerability recommendation system in Linux kernel variables
FUZZ-IEEE'09 Proceedings of the 18th international conference on Fuzzy Systems
Incident Response: Information security incident response
Network Security
Hi-index | 0.00 |
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified ways that malicious users can exploit software and how developers can fix the vulnerabilities. They have also built a variety of source code security checking software applications to partially automate the task of performing a security analysis of a program. Although great advances have been made in this area, the core problem of how the security vulnerabilities occur still exists. An answer to this problem could be a paradigm shift from imperative to functional programming techniques. This may hold the key to removing software vulnerabilities altogether.