![Cross-platform software / Software testing / Hacking / Vulnerability / C / Buffer overflow / Null / Pointer / Find / Computing / Software engineering / Computer programming Cross-platform software / Software testing / Hacking / Vulnerability / C / Buffer overflow / Null / Pointer / Find / Computing / Software engineering / Computer programming](https://www.pdfsearch.io/img/0b31bf530f370e07bbbc546014b8f3af.jpg) Date: 2013-05-07 16:56:14Cross-platform software Software testing Hacking Vulnerability C Buffer overflow Null Pointer Find Computing Software engineering Computer programming | | Analysis procedure overview The goals of analysis are: To collect various numbers for test cases and/or tool reports, e.g., numbers of true tool warnings by weakness category. To estimate tool overlap (to what degree do Add to Reading ListSource URL: samate.nist.govDownload Document from Source Website File Size: 177,83 KBShare Document on Facebook
|