- Apple Inc. Xcode overview, 2014; http://bit.ly/1kXUAzDGoogle Scholar
- Arthur, C. Apple's SSL iPhone vulnerability: How did it happen, and what next? The Guardian, (Feb. 25, 2014); http://www.theguardian.com/technology/2014/feb/25/apples-ssl-iphone-vulnerability-how-did-it-happen-and-what-next.Google Scholar
- Auerbach, D. An extraordinary kind of stupid. Slate (Feb. 25, 2014); http://slate.me/1o75yGsGoogle Scholar
- Bellovin, S.M. Goto Fail. SMBlog (Feb. 23, 2014); https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-23.html.Google Scholar
- Bland, M. Test Certified, 2011; http://mike-bland.com/2011/10/18/test-certified.html.Google Scholar
- Bland, M. Testing on the Toilet, 2011; http://mike-bland.com/2011/10/25/testing-on-the-toilet.html.Google Scholar
- Bland, M. Test Mercenaries, 2012; http://mike-bland.com/2012/07/10/test-mercenaries.html.Google Scholar
- Bland, M. AutoTest Central, 2014; http://autotestcentral.com/small-medium-and-large-test-sizesGoogle Scholar
- Dijkstra, E. A case against the GO TO statement. Commun. ACM 11, 3 (Nov. 1968), 147--148; http://www.cs.utexas.edu/users/EWD/ewd02xx/EWD215.PDF. Google ScholarDigital Library
- Fuller, L. TestableSecurity: demonstrating that <code>SSLVerifySignedServerKeyExchange()</code> is trivially testable, 2014; https://github.com/landonf/Testability-CVE-2014-1266.Google Scholar
- Google, Inc. Too many tests. Google Testing Blog (Feb. 21, 2008); http://googletesting.blogspot.com/2008/02/in-movie-amadeus-austrian-emperor.html.Google Scholar
- Greenfield, R. Why Apple's power cords keep breaking. The Wire (July 30, 2012); http://www.thewire.com/technology/2012/07/why-apples-power-cords-keep-breaking/55202/.Google Scholar
- Langley, A. Apple's SSL/TLS bug. Imperial Violet (Feb. 22, 2014); https://www.imperialviolet.org/2014/02/22/applebug.html.Google Scholar
- Ray, C.K. TDD and signed SSLVerifySignedServerKeyExchange. Exploring Agile Solutions: Software Development with Agile Practices (Feb. 23, 2014); http://agilesolutionspace.blogspot.com/2014/02/tdd-and-signed-sslverifysignedserverkey.html.Google Scholar
- Schneier, B. Was the iOS SSL flaw deliberate? Schneier on Security: A Blog Covering Security and Security Technology (Feb. 2014); https://www.schneier.com/blog/archives/2014/02/was_the_ios_ssl.html.Google Scholar
- van Deursen, A. Learning from Apple's #gotofail security bug. Arie van Deursen: Software Engineering in Theory and Practice (Feb. 22, 2014); http://avandeursen.com/2014/02/22/gotofail-security/.Google Scholar
Index Terms
- Finding more than one worm in the apple
Recommendations
Finding More Than One Worm in the Apple: If you see something, say something.
SecurityIn February Apple revealed and fixed an SSL (Secure Sockets Layer) vulnerability that had gone undiscovered since the release of iOS 6.0 in September 2012. It left users vulnerable to man-in-the-middle attacks thanks to a short circuit in the SSL/TLS (...
One year later: A large system conversion
SIGUCCS '77: Proceedings of the 5th annual ACM SIGUCCS conference on User servicesDuring the period that we were going through the acquisition process—talking to vendors and to management and users at other installations—conversion was, of course, in the back of our minds. The staff at other installations was unanimous: conversion ...
Just one slice of innovation, please
Attack of the killer virusWe all like to think that humans are hungry for innovation, anxious to find revolutionary products that improve the way we live and work. Recently, though, I've begun to wonder if that's true. I think we want technology to enhance the quality of life, ...
Comments