A Process for Performing Security Code Reviews

  • Authors:
  • Michael Howard

  • Affiliations:
  • Microsoft

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

No one really likes reviewing source code for security vulnerabilities, but it's a critical componentof shipping secure software. Howard describes his approach to tackling the process. It won't identify allsecurity vulnerabilities in your code, but it's effective for scanning large amounts of code quickly forcommon issues and reviewing risky code in greater depth.