Securing Java: getting down to business with mobile code
Securing Java: getting down to business with mobile code
ITS4: A static vulnerability scanner for C and C++ code
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
IEEE Security and Privacy
Building Secure Software: How to Avoid Security Problems the Right Way (paperback) (Addison-Wesley Professional Computing Series)
Using Automated Fix Generation to Secure SQL Statements
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Security Strength Measurement for Dongle-Protected Software
IEEE Security and Privacy
On automated prepared statement generation to remove SQL injection vulnerabilities
Information and Software Technology
Training ≠ education: putting secure software engineering back in the classroom
Proceedings of the 14th Western Canadian Conference on Computing Education
Security testing: mind the knowledge gap
ACM SIGCSE Bulletin
Software Fault Feature Clustering Algorithm Based on Sequence Pattern
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Hi-index | 0.02 |
A critical challenge facing software security today is the dearth of experienced practitioners. Approaches that rely solely on apprenticeship as a method of propagation won't scale quickly enough to address this burgeoning problem, so as the field evolves and establishes best practices, knowledge management can play a central role in encapsulating and spreading the emerging discipline more efficiently. This article is about the kinds of security knowledge that can provide a solid foundation for software security practices.