Back to Results
First PageMeta Content
Computer network security / Software testing / National security / Secure communication / Vulnerability / Application security / Software bug / Threat / Cross-site scripting / Cyberwarfare / Computer security / Security


A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division
Add to Reading List

Document Date: 2006-09-13 14:57:13


Open Document

File Size: 126,96 KB

Share Result on Facebook

City

Maynard / Washington / Reading / Oakland / St. Louis / Seattle / Redmond / New York / Marina del Rey / Washington / DC / Livermore / Chicago / /

Company

National Security Systems / Digital Equipment Corporation / BBC News / Microsoft Press / Lawrence Livermore Laboratory / Computers And Related Systems / IBM / GE / James P. Anderson and Co. / Presidio Press / /

Country

United States / /

Currency

USD / /

/

Event

Product Issues / /

Facility

Building Trustworthy Applications / University of California at Davis / Fort Washington / HQ Electronic Systems Division / Purdue University / Carnegie Mellon University / Information Sciences Institute / Hanscom AFB / Terminal System / University of Southern California / /

IndustryTerm

disk-arm elevator algorithm / web applications / diskarm elevator algorithm / web application / money installing precall-validation systems / security systems / particular solution / internet security vulnerabilities / model checking technology / static analysis tools / natural gas pipeline equipment / software security problems / cellular telephone network / code analysis tools / Web publication / analog cellular telephone industry / security technology / flaw-detection tools / software security tooling effort / Web Application Security Project / Software assurance / assist software security evaluations / recursive processing / web application vulnerabilities / type-based static analysis tool / web application security vulnerabilities / cellular telephone industry / software security flaws / validation tool / certain ftp server / assurance systems / web app / static analysis technology / software risks / /

OperatingSystem

UNIX / VAX/VMS / Linux / OS/360 / Multics / /

Organization

University of California / Information Sciences Institute / SANS / Central Intelligence Agency / University of Southern California / Carnegie Mellon University / Naval Postgraduate School / Electronic Systems Division / Committee on National Security Systems / Purdue University / Institute for Computer Sciences and Technology / Department of Computer Science / National Bureau of Standards / United States Department of Defense / Department of Defense / /

Person

Gus Weiss / D. Schroeder / Klaus Julisch / Thomas J. Watson / Doug Schales / Aslam / Peter Neumann / Robert Mabee / M. Ward / Matthew Kaplan / Sue McIntosh / F. P. Brooks / Jr. / David Toll / Elaine Palmer / Larry Koved / Dave Safford / Sam Weber Paul / Paul A. Karger Amit Paradkar / /

Position

Software/Program Verification General / account Bishop / Bishop / programmer / text editor / application programmer / /

Product

Landwehr / compilers / /

ProgrammingLanguage

DC / /

ProvinceOrState

Southern California / New York / Washington / Missouri / California / Illinois / Massachusetts / /

PublishedMedium

The RISKS Digest / IEEE Transactions on Software Engineering / RISKS Digest / /

Region

Southern California / /

Technology

static analysis technology / Linux / API / Multics processor / operating system / cryptography / security technology / cell phones / UNIX / UNIX operating system / cloning / operating systems / disk-arm elevator algorithm / cellular telephone / diskarm elevator algorithm / model checking technology / /

URL

http /

SocialTag