نتایج جستجو برای: static security assessment

تعداد نتایج: 833814  

2012

This paper describes our experience of doing variation analysis of known security vulnerabilities in C++ projects including core operating system and browser COM components, using an extended static checker HAVOC-LITE. We describe the extensions made to the tool to be applicable on such large components, along with our experience of using an extended static checker in the large. We argue that t...

Journal: :J. Information Security 2011
Zakaria I. Saleh Heba Refai Ahmad Mashhour

Security risk assessment framework provides comprehensive structure for security risk analysis that would help uncover systems’ threats and vulnerabilities. While security risk assessment is an important step in the security risk management process, this paper will focus only on the security risk assessment framework. Viewing issues that exist in a current framework, we have developed a new fra...

2016
Jun.Liu Zuhua Guo

A method of cloud security risk assessment based on fuzzy entropy weight is proposed. In this framework, seven aspects of cloud security risk assessment indicators are set up, include the virtualization, data security, infrastructure, applications, soft environment, cloud services and security management. The simulation results show that the fuzzy entropy weight method is effective for the clou...

2010
Fan Yang Hidehiko Masuhara Tomoyuki Aotani Flemming Nielson Hanne Riis Nielson

Enforcing security policies to distributed systems is difficult, in particular, when a system contains untrusted components. We designed AspectKE*, a distributed AOP language based on a tuple space, to tackle this issue. In AspectKE*, aspects can enforce access control policies that depend on future behavior of running processes. One of the key language features is the predicates and functions ...

Journal: :CoRR 2015
Bhargava Shastry

Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write. But, it presents multiple challenges not the least of which is understanding what makes a bug exploitable and conveying this information to the developer. In this paper, we p...

2016
Bhargava Shastry Fabian Yamaguchi Konrad Rieck Jean-Pierre Seifert

Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write. But, it presents multiple challenges not the least of which is understanding what makes a bug exploitable and conveying this information to the developer. In this paper, we p...

2007
Lizzie Coles-Kemp Richard E. Overill

The risk assessment methodologies that are portrayed in traditional information security management literature often do not scale into the multi-level stakeholder environment of corporate governance. This is because they focus on one type of stakeholder, the IT infrastructure. A risk assessment methodology that is to successfully operate in such an environment must have effective mechanisms of ...

2005
Piotr Nienaltowski Vaclav Skala Dario Alvarez Gutierrez Peter Andersen Giuseppe Attardi Mark Van der Brand Alex Buckley Paul Kelly Francisco Ortin Frank Piessens Peter Sturm Kapil Vaswani Luis Veiga

The base class library of the .NET Framework makes extensive use of the Code Access Security system to ensure that partially trusted code can be executed securely. Imperative or declarative permission demands indicate where permission checks have to be performed at run time to make sure partially trusted code does not exceed the permissions granted to it in the security policy. In this paper we...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید