skip to main content
Software vulnerability analysis
Publisher:
  • Purdue University
  • Dept. of Computer Sciences West Lafayette, IN
  • United States
ISBN:978-0-591-97137-8
Order Number:AAI9900214
Pages:
171
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Yitagesu S, Xing Z, Zhang X, Feng Z, Li X and Han L (2023). Extraction of Phrase-based Concepts in Vulnerability Descriptions through Unsupervised Labeling, ACM Transactions on Software Engineering and Methodology, 32:5, (1-45), Online publication date: 30-Sep-2023.
  2. Abid C, Alizadeh V, Kessentini M, Dhaouadi M and Kazman R (2021). Prioritizing refactorings for security-critical code, Automated Software Engineering, 28:2, Online publication date: 1-Nov-2021.
  3. Li X, Chang X, Board J and Trivedi K A novel approach for software vulnerability classification 2017 Annual Reliability and Maintainability Symposium (RAMS), (1-7)
  4. ACM
    Moshtari S and Sami A Evaluating and comparing complexity, coupling and a new proposed set of coupling metrics in cross-project vulnerability prediction Proceedings of the 31st Annual ACM Symposium on Applied Computing, (1415-1421)
  5. ACM
    Munaiah N and Meneely A Vulnerability severity scoring and bounties: why the disconnect? Proceedings of the 2nd International Workshop on Software Analytics, (8-14)
  6. Camilo F, Meneely A and Nagappan M Do bugs foreshadow vulnerabilities? Proceedings of the 12th Working Conference on Mining Software Repositories, (269-279)
  7. ACM
    Meneely A, Tejeda A, Spates B, Trudeau S, Neuberger D, Whitlock K, Ketant C and Davis K An empirical investigation of socio-technical code review metrics and security vulnerabilities Proceedings of the 6th International Workshop on Social Software Engineering, (37-44)
  8. ACM
    Hunny U, Zulkernine M and Weldemariam K OSDC Proceedings of the 28th Annual ACM Symposium on Applied Computing, (1131-1136)
  9. Meneely A and Lucidi S Vulnerability of the day: concrete demonstrations for software engineering undergraduates Proceedings of the 2013 International Conference on Software Engineering, (1154-1157)
  10. Nguyen V and Massacci F An idea of an independent validation of vulnerability discovery models Proceedings of the 4th international conference on Engineering Secure Software and Systems, (89-96)
  11. ACM
    Khan M and Zulkernine M Building components with embedded security monitors Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS, (133-142)
  12. ACM
    Wang J and Guo M Vulnerability categorization using Bayesian networks Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  13. ACM
    Hansen J and Hansen N A taxonomy of vulnerabilities in implantable medical devices Proceedings of the second annual workshop on Security and privacy in medical and home-care systems, (13-20)
  14. Park C, Lee J, Seo S and Kim B Assuring software security against buffer overflow attacks in embedded software development life cycle Proceedings of the 12th international conference on Advanced communication technology, (787-790)
  15. Penta M, Cerulo L and Aversano L (2009). The life and death of statically detected vulnerabilities, Information and Software Technology, 51:10, (1469-1484), Online publication date: 1-Oct-2009.
  16. Jin S, Wang Y, Cui X and Yun X A review of classification methods for network vulnerability Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (1171-1175)
  17. ACM
    Gegick M, Williams L, Osborne J and Vouk M Prioritizing software security fortification throughcode-level metrics Proceedings of the 4th ACM workshop on Quality of protection, (31-38)
  18. ACM
    Shin Y and Williams L Is complexity really the enemy of software security? Proceedings of the 4th ACM workshop on Quality of protection, (47-50)
  19. ACM
    Ozment A Improving vulnerability discovery models Proceedings of the 2007 ACM workshop on Quality of protection, (6-11)
  20. Cox D, Al-Nashif Y and Hariri S Application of autonomic agents for global information grid management and security Proceedings of the 2007 Summer Computer Simulation Conference, (1147-1154)
  21. Debbabi M, Saleh M, Talhi C and Zhioua S Common Criteria Approach to J2ME CLDC Security Requirements Proceedings of the 2006 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06, (177-194)
  22. ACM
    Gegick M and Williams L (2005). Matching attack patterns to security vulnerabilities in software-intensive system designs, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
  23. ACM
    Gegick M and Williams L Matching attack patterns to security vulnerabilities in software-intensive system designs Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications, (1-7)
  24. Baiardi F and Telmon C A theoretical model for the average impact of attacks on billing infrastructures Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (298-310)
  25. Serdiouk V Behavior-based model of detection and prevention of intrusions in computer networks Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (380-393)
  26. Seo S, You J, Kim Y, Choi J, Lee S and Kim B Building security requirements using state transition diagram at security threat location Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (451-456)
  27. Zbib R, Anjum F, Ghosh A and Umar A (2004). Intrusion Tolerance in Distributed Middleware, Information Systems Frontiers, 6:1, (67-75), Online publication date: 1-Mar-2004.
  28. Krsul I Software development in antagonistic and dynamic operational environments Proceedings of the 3rd Symposium on Requirements Engineering for Information Security, (1-14)
  29. ACM
    Jonsson E, Strömberg L and Lindskog S On the functional relation between security and dependability impairments Proceedings of the 1999 workshop on New security paradigms, (104-111)
Contributors
  • University of Florida
  • Purdue University

Recommendations