Gold Standard Method for Benchmarking C Source Code Static Analysis Tools
|
|
|
- Barbara Long
- 10 years ago
- Views:
Transcription
1 Gold Standard Method for Benchmarking C Source Code Static Analysis Tools Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Henny Sipma Sr. Computer Scientist Kestrel Technology, LLC [email protected] (650)
2 Kestrel Technology Core activity: Sound static analysis (mathematical proof of safety) Tool: CodeHawk Languages supported: C, Java, x86 executables Underlying technology: Abstract interpretation (Cousot,Cousot, 1977) Properties C: Founded: 2000 Location: Palo Alto, CA Language-level properties: memory safety, null-dereference (application-independent, mathematically well-defined properties) CWEs: ,129,131,242,252,391, ,476,682, ,805,806,824,839 Java: Taint analysis, loop-bound analysis (CWE606), integer overflow (CWE190/191) X86: Memory safety, information extraction 2
3 Our Tool: CodeHawk Java byte code front end.class.jar.war sound abstraction from Java byte code into CHIF abstract interpretation engine C source code front end Iterators.c.exe CIL sound abstraction from preprocessed CIL code into CHIF x86 binary front end disassembly abstraction from x86 binary code into CHIF Abstract domains: constants intervals strided intervals linear equalities polyhedra symbolic sets value sets taint
4 Proving safety of C programs Starting point: Mathematically well-defined properties Proving absence of: CWEs: ,129,131,242,252,391, ,476,682, ,805,806,824,839 Create proof obligations Safety conditions that state that the property holds at every relevant location in the program Generate invariants Assertions at all locations that are true for all inputs for all program executions Discharge proof obligations Location is safe from targeted vulnerabilities if invariants generated imply the safety conditions 4
5 Proving safety of C programs: feasible? Not automatic: undecidable problem Not easy: Klein et al., Sel4: Formal Verification of an OS Kernel, SOSP 2009 Program size: 8700 lines of C, 600 lines of assembly code Proof effort : 11 person-years Our own experience with CodeHawk: 1100 small test programs (SAMATE): fully automatic, a few minutes Larger benchmark programs (up to 1200 LOC): full verification: 1-2 person-weeks Real-world applications (up to 100,000 LOC): 55-67% of proof obligations discharged automatically (~5 mins) 5
6 Proving safety of C programs: our proposal (TTA #1: Software Assurance) Perform a full verification of 6 real-world C applications - ranging in size from 50, ,000 LOC, - for CWEs 119, 120,121, 122, 123, 124, 125, 126, 127, 129, 131, 134, 170, 242, 252, 391, 415, 416, 457, 466, 467, 468, 469, 476, 682, 786, 787, 788, 805, 806, 824,839 Ambitious? Interesting Research? Immediate Operational Capability Yes, a very important one, but first a brief interlude on the current static analysis landscape 6
7 Static Analysis Landscape: Bug-finders Current Reality: Bug-finders are the first line of defense against software vulnerabilities (but how effective are these bug-finders?) Two important terms: False positive: bug report that turns out not to be a bug Makes software developers and managers very unhappy False negative: bug that is not reported Invisible, until exploited 7
8 Static Analysis Landscape: Bug-finders False positive: bug report that turns out not to be a bug Makes software developers and managers very unhappy Reality: Naturally, software developers heavily favor bug-finders with low false-positive rate Low false positive rate is very easy to obtain for a bug-finder: Only report a bug if it is 99% likely to be a bug otherwise keep quiet Very high false negative rate (but that s invisible to the developer) 8
9 The problem: Evaluating bug-finders The hated false positives The invisible false negatives Tool A Tool B 9
10 The problem: Evaluating bug-finders The hated false positives Tool A Tool B Developer will choose Tool A Tool Vendor B is forced to lower its false positive rate (and the only cost-effective way to do so, is to increase false negatives) to stay in business Strong economic incentive for tools that provide less assurance Society suffers 10
11 The problem: Evaluating bug-finders Maybe dealing with the extra false positives can be justified by knowing that a much higher level of assurance is achieved Make these false negatives visible! Give Tool B due credit for its low false negative rate Tool A Tool B 11
12 Evaluating Bug-finders Problem has long been recognized by NIST: Dr. Paul Black Small synthetic benchmarks SAMATE (1163 test cases by MIT/Lincoln Labs), 2005 Juliet Test Suite v1.0 (45,324 test cases), Dec 2010 Juliet Test Suite v1.0 (57,099 test cases), Sep 2012 SATE competition: (real-world programs) 2008: Nagios, Lighttpd, Naim 2009: Irssi, Pvm 2010: Dovecot,. 2011:. 12
13 SATE competition: participation 13
14 Evaluating Bug-finders Problem has long been recognized by NIST: Dr. Paul Black Small synthetic benchmarks SAMATE (1163 test cases by MIT/Lincoln Labs), 2005 Juliet Test Suite v1.0 (45,324 test cases), Dec 2010 Juliet Test Suite v1.0 (57,099 test cases), Sep 2012 SATE competition: (real-world programs) Measuring false positives and false negatives 2008: Nagios, Lighttpd, Naim 2009: Irssi, Pvm 2010: Dovecot,. 2011:. 14
15 Evaluating Bug-finders Problem has long been recognized by NIST: Dr. Paul Black Small synthetic benchmarks SAMATE (1163 test cases by MIT/Lincoln Labs), 2005 Juliet Test Suite v1.0 (45,324 test cases), Dec 2010 Juliet Test Suite v1.0 (57,099 test cases), Sep 2012 SATE competition: (real-world programs) Measuring false positives and false negatives 2008: Nagios, Lighttpd, Naim 2009: Irssi, Pvm 2010: Dovecot,. 2011:. Gold standard + measurement tool 15
16 Tasks 1. Definition of metrics (02/13) Redefine false positive rate / false negative rate relative to ground truth 2. Develop analysis support for CWEs 457, 415/416, 170, and 134 (11/13) Uninitialized variables, use-after-free, double-free, improper null-termination, uncontrolled format string 3. Increase level of proof obligations proven automatically to > 80% (06/14) Increase precision by improved pointer analysis, limited shape analysis, and higher degree of context sensitivity Preliminary results for proving memory safety (2010) 16
17 Tasks (cont d) 4. Specialize the analyzer for the six applications to achieve 100% (06/14) E.g. introduce application-specific data structure invariants, environment assumptions 5. Develop measurement tool (08/14) Evaluate results Ground truth report Static Analysis tool results Application-type-specific strengths and weaknesses of bug-finder tool evaluated 6. Apply measurement tool to published results and SWAMP tools (08/14) 17
18 Technology Transfer Commercialization Software assurance centers (Lockheed Martin, GE,.) Static analysis tool developers Developers of high-security software Evaluation kit, available Q Government customers NIST Provide prototype to NIST, early 2013 Incorporate feedback from NIST, throughout the program Provide support for future SATE competitions Interested in other collaborations 18
19 Contribution to SWAMP Evaluate tools for false positives and false negatives on benchmark programs 19
20 Operational Capability Better assessment of vulnerabilities in critical cyber infrastructure Tool X Measurement tool: Provide advice which tool, or combination of tools is best suitable for each application area Tool Z Tool Y 20
21 Benefits to society Create bigger market opportunity for high-quality static analysis tool vendors by enabling differentiating on false negatives Let the market do its work To create higher and higher levels of software assurance 21
22 Gold Standard Method for Benchmarking C Source Code Static Analysis Tools Kestrel Technology, LLC, TTA SATE results Create market opportunity for highquality software and high-quality tools Evaluate Let market increase software assurance levels Ground truth report Operational Capability Quantitative performance targets: Complete metrics definition for all targeted CWEs Increase percentage automation of proof to 80% 100% analysis of 6 NIST SATE applications for targeted CWEs Cost of ownership: all deliverables provided under research contract with no additional cost Benefits to DHS and society at large Allows measurement of false negatives of bug-finding tools Allows DHS to more accurately assess vulnerability exposure Feedback aids developers of bug-finders to improve their tools Advances the state of the art in scalable sound static analysis Proposed Technical Approach Goal: Provide Gold Standard benchmarking method for SWAMP-resident static analysis tools Tasks: Define metrics as basis for measurement Develop analysis support for CWEs 134,415/6,457,170) Increase percentage of safety conditions proven automatically Full reference analysis of 6 NIST SATE benchmark applications Develop scoring tool to compare tool results to reference Current status of proposed technology: Working prototype C analyzer based on abstract interpretation that automatically proves 55-67% of memory safety conditions for NIST benchmark applications Schedule and Milestones: 24 months period of performance 6: Definition of metrics 15: Analysis coverage for CWEs 457, 415/6, 134, : 80% level of automation on NIST benchmarks 22: 100% analysis of NIST benchmarks 24: Measurement tool, evaluation of SATE participants tools Deliverables: Gold Standard Analysis of NIST benchmarks Measurement tool to compare SWAMP results with reference Tool (as executable) with government rights Corporate Contact: Doug Smith, [email protected] 3260 Hillview Ave, Palo Alto, CA 94304, (650)
Gold Standard Benchmark for Static Source Code Analyzers
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Gold Standard Benchmark for Static Source Code Analyzers Kestrel Technology, LLC Dr. Henny B. Sipma Sep 16, 2013 Kestrel Technology Founded: 2000 Location:
Using Static Code Analysis Tools for Detection of Security Vulnerabilities
Using Static Code Analysis Tools for Detection of Security Vulnerabilities Katerina Goseva-Popstajanova & Andrei Perhinschi Lane Deptartment of Computer Science and Electrical Engineering West Virginia
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
How To Develop A Static Analysis System For Large Programs
Towards the Industrial Scale Development of Custom Static Analyzers John Anton, Eric Bush, Allen Goldberg, Klaus Havelund, Doug Smith, Arnaud Venet Kestrel Technology LLC 4984 El Camino Real #230 Los Altos,
Static Analysis Tool Exposition (SATE) 2008
Special Publication 500-279 Static Analysis Tool Exposition (SATE) 2008 Editors: Vadim Okun Romain Gaucher Paul E. Black Software and Systems Division Information Technology Laboratory National Institute
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Source Code Security Analysis Tool Functional Specification Version 1.0
Special Publication 500-268 Source Code Security Analysis Tool Functional Specification Version 1.0 Paul E. Black Michael Kass Michael Koo Software Diagnostics and Conformance Testing Division Information
Visualizing Information Flow through C Programs
Visualizing Information Flow through C Programs Joe Hurd, Aaron Tomb and David Burke Galois, Inc. {joe,atomb,davidb}@galois.com Systems Software Verification Workshop 7 October 2010 Joe Hurd, Aaron Tomb
Software Engineering Introduction & Background. Complaints. General Problems. Department of Computer Science Kent State University
Software Engineering Introduction & Background Department of Computer Science Kent State University Complaints Software production is often done by amateurs Software development is done by tinkering or
Real World Software Assurance Test Suite: STONESOUP
Real World Software Assurance Test Suite: STONESOUP Charles Oliveira/SAMATE Guest Researcher at Software and Systems Division, IT Laboratory NIST Outline - Introduction STONESOUP
Software Testing & Analysis (F22ST3): Static Analysis Techniques 2. Andrew Ireland
Software Testing & Analysis (F22ST3) Static Analysis Techniques Andrew Ireland School of Mathematical and Computer Science Heriot-Watt University Edinburgh Software Testing & Analysis (F22ST3): Static
Redefining Static Analysis A Standards Approach. Mike Oara CTO, Hatha Systems
Redefining Static Analysis A Standards Approach Mike Oara CTO, Hatha Systems Software Analysis for Compliance Compliance Assessment Requires Software Analysis Dynamic Analysis Option Static Analysis Performed
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Automated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
Software security assessment based on static analysis
Software security assessment based on static analysis Christèle Faure Séminaire SSI et méthodes formelles Réalisé dans le projet Baccarat cofinancé par l union européenne Context > 200 static tools for
Towards practical reactive security audit using extended static checkers 1
Towards practical reactive security audit using extended static checkers 1 Julien Vanegue 1 Shuvendu K. Lahiri 2 1 Bloomberg LP, New York 2 Microsoft Research, Redmond May 20, 2013 1 The work was conducted
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Abstract Interpretation-based Static Analysis Tools:
Abstract Interpretation-based Static Analysis Tools: Proving the Absence of Runtime Errors and Safe Upper Bounds on the Worst-Case Execution Time and Safe Upper Bounds on the Stack Usage Christian Ferdinand
Continuous Prevention Testing
Continuous Prevention Testing By Andre Gironda OWASP October 2007 Bio Andre Gironda OWASP Phoenix, Chicago, MSP Other projects involved in WASC WASSEC NIST SAMATE Web Application Scanner Focus Group Web
The Security Development Lifecycle
The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s
TECHNOLOGY STRATEGY AUDIT
TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series
Module 12. Software Project Monitoring and Control. Version 2 CSE IIT, Kharagpur
Module 12 Software Project Monitoring and Control Lesson 31 Risk Management and Software Configuration Management Specific Instructional Objectives At the end of this lesson the student would be able to:
Open-source Versus Commercial Software: A Quantitative Comparison
Open-source Versus Commercial Software: A Quantitative Comparison Rix Groenboom Reasoning NL BV [email protected] Agenda About Reasoning The Study Inspection Results Analysis Conclusions New
Code Dx: Visual analytics for triage of source code vulnerabilities
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Code Dx: Visual analytics for triage of source code vulnerabilities Secure Decisions, a division of Applied Visions, Inc. Anita D Amico Ken Prole September
InvGen: An Efficient Invariant Generator
InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
TIBCO Cyber Security Platform. Atif Chaughtai
TIBCO Cyber Security Platform Atif Chaughtai 2 TABLE OF CONTENTS 1 Introduction/Background... 3 2 Current Challenges... 3 3 Solution...4 4 CONCLUSION...6 5 A Case in Point: The US Intelligence Community...7
Introduction to Static Analysis for Assurance
Introduction to Static Analysis for Assurance John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby Static Analysis for Assurance: 1 Overview What is static analysis?
Trustworthy Software Systems
Trustworthy Software Systems Greg Morrisett Cutting Professor of Computer Science School of Engineering & Applied Sciences Harvard University Little about me Research & Teaching Compilers, Languages, Formal
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development
Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC) 3 12 February 2015 Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching,
Machine vs. Machine: Lessons from the First Year of Cyber Grand Challenge. Approved for Public Release, Distribution Unlimited
Machine vs. Machine: Lessons from the First Year of Cyber Grand Challenge 1 DARPA BAA 14-05 Autonomous cyber defense capabilities that combine the speed and scale of automation with reasoning abilities
STATIC CODE ANALYSIS Alexandru G. Bardas 1
Abstract STATIC CODE ANALYSIS Alexandru G. Bardas 1 A lot of the defects that are present in a program are not visible to the compiler. Static code analysis is a way to find bugs and reduce the defects
Using the Juliet Test Suite to compare Static Security Scanners
Using the Juliet Test Suite to compare Static Security Scanners Andreas Wagner 1, Johannes Sametinger 2 1 GAM Project, IT Solutions, Schwertberg, Austria 2 Dept. of Information Systems Software Engineering,
Introduction to Software Engineering. 8. Software Quality
Introduction to Software Engineering 8. Software Quality Roadmap > What is quality? > Quality Attributes > Quality Assurance: Planning and Reviewing > Quality System and Standards 2 Sources > Software
2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
Federal Mobile App Vetting Center for Assured Software Pilot. Nick Valletta
Federal Mobile App Vetting Center for Assured Software Pilot Nick Valletta MOBILE SECURITY: A REAL ISSUE Slide 2 of 20 NOTEWORTHY ANDROID APP TRENDS 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Trends Among
A Technical Review of TIBCO Patterns Search
A Technical Review of TIBCO Patterns Search 2 TABLE OF CONTENTS SUMMARY... 3 ARCHITECTURAL OVERVIEW... 3 HOW DOES TIBCO PATTERNS SEARCH WORK?... 5 ELIMINATE THE NEED FOR RULES... 7 LOADING AND SYNCHRONIZING
Detecting Critical Defects on the Developer s Desktop
Detecting Critical Defects on the Developer s Desktop Seth Hallem CEO Coverity, Inc. Copyright Coverity, Inc. 2006. All Rights Reserved. This publication, in whole or in part, may not be reproduced, stored
The Road from Software Testing to Theorem Proving
The Road from Software Testing to Theorem Proving A Short Compendium of my Favorite Software Verification Techniques Frédéric Painchaud DRDC Valcartier / Robustness and Software Analysis Group December
Software security specification and verification
Software security specification and verification Erik Poll Security of Systems (SoS) group Radboud University Nijmegen Software (in)security specification and verification/detection Erik Poll Security
Oracle Solaris Studio Code Analyzer
Oracle Solaris Studio Code Analyzer The Oracle Solaris Studio Code Analyzer ensures application reliability and security by detecting application vulnerabilities, including memory leaks and memory access
Lecture Notes on Linear Search
Lecture Notes on Linear Search 15-122: Principles of Imperative Computation Frank Pfenning Lecture 5 January 29, 2013 1 Introduction One of the fundamental and recurring problems in computer science is
Cloud9 Parallel Symbolic Execution for Automated Real-World Software Testing
Cloud9 Parallel Symbolic Execution for Automated Real-World Software Testing Stefan Bucur, Vlad Ureche, Cristian Zamfir, George Candea School of Computer and Communication Sciences Automated Software Testing
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Testing and Source Code Auditing Secure Software Programming 2 Overview
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
Hardware Enabled Zero Day Protection
Hardware Enabled Zero Day Protection Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Paul A. Rivera President/CEO Def-Logix, Inc. Email: [email protected] Phone: 210-478-1369
A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security Nominee International Security Executives (ISE ) Information Security Project of the Year
Optimizing Network Vulnerability
SOLUTION BRIEF Adding Real-World Exposure Awareness to Vulnerability and Risk Management Optimizing Network Vulnerability Management Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
Logistics. Software Testing. Logistics. Logistics. Plan for this week. Before we begin. Project. Final exam. Questions?
Logistics Project Part 3 (block) due Sunday, Oct 30 Feedback by Monday Logistics Project Part 4 (clock variant) due Sunday, Nov 13 th Individual submission Recommended: Submit by Nov 6 th Scoring Functionality
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
Linux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Five Steps to Secure Outsourced Application Development
Five Steps to Secure Outsourced Application Development Contents Executive Summary... 3 Software: Today s Biggest Security Risk... 4 Offshore Development Trends... 5 Five Key Steps... 6 Step 1 Risk Assessment
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment
Cyber Essentials PLUS. Common Test Specification
Cyber Essentials PLUS Common Test Specification Page 1 Version Control Version Date Description Released by 1.0 07/08/14 Initial Common Test Specification release SR Smith 1.1 19/08/14 Updated Scope SR
White Paper. Understanding NIST 800 37 FISMA Requirements
White Paper Understanding NIST 800 37 FISMA Requirements Contents Overview... 3 I. The Role of NIST in FISMA Compliance... 3 II. NIST Risk Management Framework for FISMA... 4 III. Application Security
Chair of Software Engineering. Software Verification. Assertion Inference. Carlo A. Furia
Chair of Software Engineering Software Verification Assertion Inference Carlo A. Furia Proving Programs Automatically The Program Verification problem: Given: a program P and a specification S = [Pre,
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Coverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects
Effective Management of Static Analysis Vulnerabilities and Defects Introduction According to a recent industry study, companies are increasingly expanding their development testing efforts to lower their
Vision & Positioning Statement For Wurldtech Labs
Vision & Positioning Statement For Wurldtech Labs Wurldtech Security Technologies s Industrial Cyber Security Solutions For Global Process Automation & Control System Stakeholders Presentation Purpose
VOLUME 4. State of Software Security Report. The Intractable Problem of Insecure Software
VOLUME 4 State of Software Security Report The Intractable Problem of Insecure Software December 7, 2011 Executive Summary The following are some of the most significant findings in the Veracode State
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
Introducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
IKOS: A Framework for Static Analysis based on Abstract Interpretation (Tool Paper)
IKOS: A Framework for Static Analysis based on Abstract Interpretation (Tool Paper) Guillaume Brat, Jorge A. Navas, Nija Shi, and Arnaud Venet NASA Ames Research Center, Moffett Field, CA 94035 Abstract.
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
The Hacker Strategy. Dave Aitel [email protected]. Security Research
1 The Hacker Strategy Dave Aitel [email protected] Security Research Who am I? CTO, Immunity Inc. History: NSA->@stake -> Immunity Responsible for new product development Vulnerability Sharing Club
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC) Supriyo Bhattacharjee MOF Capability Maturity Model (CMM) A bench-mark for measuring the maturity of an organization s software process CMM defines 5 levels of process
Software Testing in the Cloud. Tauhida Parveen, PhD [email protected]
Software Testing in the Cloud Tauhida Parveen, PhD [email protected] About Me University Department Chair, Software Engineering, Keiser University PhD, CS, Florida Institute of Technology MBA, University
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
The Advantages of Block-Based Protocol Analysis for Security Testing
The Advantages of Block-Based Protocol Analysis for Security Testing Dave Aitel Immunity,Inc. 111 E. 7 th St. Suite 64, NY NY 10009, USA [email protected] February, 4 2002 Abstract. This paper describes
How to Sandbox IIS Automatically without 0 False Positive and Negative
How to Sandbox IIS Automatically without 0 False Positive and Negative Professor Tzi-cker Chiueh Computer Science Department Stony Brook University [email protected] 2/8/06 Blackhat Federal 2006 1 Big
