Common Weakness Enumeration

Results: 22



#Item
1

CWE COMPATIBILITY ENFORCEMENT TM AUTOMATED SOURCE CODE ANALYSIS TO ENFORCE CWE COMPATIBILITY STREAMLINE CWE COMPATIBILITY ENFORCEMENT The Common Weakness Enumeration (CWE) compatibility enforcement module reports on data

Add to Reading List

Source URL: cdn2.hubspot.net

- Date: 2016-10-12 11:19:33
    2Security / Cyberwarfare / Computer security / Hacking / Cross-site request forgery / Cross-site scripting / Confused deputy problem / Common Weakness Enumeration / Directory traversal attack / Vulnerability / Access control / Web framework

    Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

    Add to Reading List

    Source URL: spw16.langsec.org

    Language: English - Date: 2016-06-05 23:38:35
    3Computing / Software testing / Software engineering / Software quality / Common Weakness Enumeration / Vulnerability / Coverity / Analysis / Fortify Software / Application security / LDRA Testbed / Static program analysis

    Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

    Add to Reading List

    Source URL: onlinepresent.org

    Language: English - Date: 2015-04-19 22:44:46
    4Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting

    Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

    Add to Reading List

    Source URL: www.jocm.us

    Language: English - Date: 2015-03-08 23:14:44
    5Computing / Cyberwarfare / Security / Computer security / Computer network security / Hacking / Software testing / Common Weakness Enumeration / Vulnerability database / Attack / Common Vulnerabilities and Exposures / Architecture tradeoff analysis method

    Architectural Analysis for Security (AAFS)

    Add to Reading List

    Source URL: resources.sei.cmu.edu

    Language: English - Date: 2015-05-01 17:51:11
    6Cross-platform software / Common Weakness Enumeration / Software bugs / CWE / Buffer overflow / Pointer / C / Dereference operator / Java

    STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Test Case Weakness Variants

    Add to Reading List

    Source URL: samate.nist.gov

    Language: English - Date: 2015-10-27 14:35:32
    7Software testing / Intelligence Advanced Research Projects Activity / Vulnerability / Common Weakness Enumeration / Go / Test case

    STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Phase 3 Test Generation Report

    Add to Reading List

    Source URL: samate.nist.gov

    Language: English - Date: 2015-10-27 14:35:32
    8Computer security / Software testing / Common Weakness Enumeration / Hacking / Mitre Corporation / Software quality / SofCheck Inspector

    SUPPLY CHAIN ASSURANCE They Know Your Weaknesses – Do You?: Reintroducing Common Weakness Enumeration Yan Wu, Bowling Green State University Irena Bojanova, University of Maryland, Baltimore County

    Add to Reading List

    Source URL: static1.1.sqspcdn.com

    Language: English - Date: 2015-09-09 02:31:41
    9Computer network security / Software testing / Hacking / Computer security / Veracode / Common Weakness Enumeration / Vulnerability / Application security / Security testing / Software quality / CVSS / Software bug

    Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

    Add to Reading List

    Source URL: owncloud.com

    Language: English - Date: 2016-04-06 15:04:57
    10Common Weakness Enumeration / Hacking / Software testing / Alloy / Buffer overflow / Actor model / Vulnerability / Software development / Modeling language / CWE

    Lightweight Formal Models of Software Weaknesses Robin Gandhi, Harvey Siy, Yan Wu College of Information Science and Technology University of Nebraska at Omaha, USA {rgandhi, hsiy, ywu}@unomaha.edu definitions. Consider

    Add to Reading List

    Source URL: faculty.ist.unomaha.edu

    Language: English - Date: 2013-05-29 09:13:46
    UPDATE