Gold Standard Benchmark for Static Source Code Analyzers
|
|
|
- Nicholas Ramsey
- 9 years ago
- Views:
Transcription
1 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Gold Standard Benchmark for Static Source Code Analyzers Kestrel Technology, LLC Dr. Henny B. Sipma Sep 16, 2013
2 Kestrel Technology Founded: 2000 Location: Palo Alto, CA Core activity: Sound static analysis (mathematical proof of safety) Properties Tool: CodeHawk Languages supported: C, Java, x86 executables Underlying technology: Abstract interpretation (Cousot,Cousot, 1977) C: Language-level properties: memory safety, null-dereference (application-independent, mathematically well-defined properties) Java: Information flow analysis, resource analysis, integer overflow, error handling X86: Memory safety, information extraction 9/12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 1 1
3 Software infrastructure: A need for software security metrics Cement is everywhere. Our very lives depend on cement, yet we don't worry about it: such is the legacy of Joseph Bazalgette, who introduced measurement and strict quality controls Like cement, software is everywhere: our very lives are becoming more and more dependent on software. Unlike cement, for more than 50 years software has been continuously released and added to the national infrastructure, plagued by design and implementation defects that were largely detectable and preventable, but were not. Why not? (from Geekonomics, David Rice) Physically safe in the largest buildings, but not safe from continuous attacks from all over the world 9/12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 2
4 Customer Need We need the ability to measure software quality We need the ability to measure the effectiveness of the tools that are used for software assurance in terms of False positives: bugs that turn out not to be bugs AND False negatives: bugs that are missed 9/12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 3
5 Problems with measurement From the 2012 Coverity Scan Report (May 2013): Did software get worse? Did detection technology get better? Some combination of the two? (number of defects per 1000 LOC) What is the "real" number? What is a defect? 9/12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 4
6 Compounding problem: Economic incentives favor less assurance Reality Customer sees false positives Tool A Tool B false negatives... and will choose Tool A Tool A Tool B 9/12/ DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP 5
7 Our Solution: Measure memory-safety defects Define Defect mathematical definition based on C standard semantics (37 cases of memory-related undefined behavior) Semantic explication of C semantics by George Necula (Berkeley, 2002) covers all of C plus gcc extensions Measure Defects mathematical proof based on Primary proof obligations (for all memory accesses and related instructions) Sound static analysis to discharge proof obligations of safe memory accesses Demonstrate vulnerability in remaining cases 9/12/ DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP 6
8 Our Solution: Measure memory-safety defects Define Defect mathematical definition based on C standard semantics (37 cases of memory-related undefined behavior) Semantic explication of C semantics by George Necula (Berkeley, 2002) covers all of C plus gcc extensions Measure Defects mathematical proof based on Primary proof obligations (for all memory accesses and related instructions) Sound static analysis to discharge proof obligations of safe memory accesses Demonstrate vulnerability in remaining cases DIFFICULT 9/12/ DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP 7
9 Approach: Capability and Technology Kestrel Technology's Core Capability: powerful and scalable, sound static analysis engine: based on theory of abstract interpretation (Cousot, Cousot 1977) generates invariants (over-approximation of program behaviors for all possible inputs Technology: Distributed Proof Structure structural induction over the control flow graph of all functions assume-guarantee reasoning based on function summaries (contracts) data structure invariants global data invariants hierarchy of primary and secondary proof obligations local invariant generation whole-program pointer analysis 9/12/ DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP 8
10 Apply to six benchmark programs lighttpd nagios naim webserver designed and optimized for high-performance environments used by several popular websites, including YouTube and Wikipedia tool for IT-infrastructure monitoring with more than a million users, including Comcast, Philips, Siemens, Thales, McAfee console chat client for AOL instant messaging (AIM) and internet relay chat (IRC) 144 files 38 KLOC 73 files 65 KLOC 44 files 23 KLOC irssi terminal-based IRC client for UNIX systems 347 files 53 KLOC pvm dovecot package that lets heterogeneous collections of Unix and Windows computers to be used as a single large parallel computer, developed by Oak Ridge Nat'l Labs open-source IMAP and POP3 server for Linux (written with security in mind) 320 files 72 KLOC 1,111 files 119 KLOC 9/12/ DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP 9
11 Apply to six benchmark programs lighttpd (SATE 2008) nagios (SATE 2008) naim (SATE 2008) webserver designed and optimized for high-performance environments used by several popular websites, including YouTube and Wikipedia tool for IT-infrastructure monitoring with more than a million users, including Comcast, Philips, Siemens, Thales, McAfee console chat client for AOL instant messaging (AIM) and internet relay chat (IRC) 144 files 38 KLOC 73 files 65 KLOC 44 files 23 KLOC irssi (SATE 2009) terminal-based IRC client for UNIX systems 347 files 53 KLOC pvm (SATE 2009) dovecot (SATE 2010) package that lets heterogeneous collections of Unix and Windows computers to be used as a single large parallel computer, developed by Oak Ridge Nat'l Labs open-source IMAP and POP3 server for Linux (written with security in mind) 320 files 72 KLOC 1,111 files 119 KLOC 9/12/ DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP 10
12 Approach: Architecture Interactive Proof Assistant XML library function summaries C program CHCIL parser compilation units XML representation of code and proofs linking units Progress Monitor Scoring Tool 3 rd party tool results Tool Report 9/12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 11
13 Approach: Scoring tool Scoring Tool: o Import results for all primary and secondary proof obligations o Import 3 rd party analysis tool results o Compare o Establish correspondence and report false negatives false positives adequacy of bug placement Identify strengths and weaknesses of 3 rd party analysis tool Programs: Apply to results from any static analysis tool in the SWAMP on o o o o o o lighttpd nagios naim irssi pvm dovecot XML XML representation XML representation of representation code and of code and proofs of code and proofs proofs Scoring Tool 3 rd party tool results Tool Report 9/12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 12
14 Benefit: Ability to grade tools client Tool A results for A report card for A Webserver Tool B results for B report card for B Network infrastructure Tool C results for C report card for C Chat client 9/12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 13
15 Collaboration (rather than Competition) Other government organizations: NIST (Dr. Paul E. Black) Vendors of bug-finding tools: Offer scoring tool as a service to Identify strengths and weaknesses in bug-finding tools Improve bug-finding tools 9/12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 14
16 Current Status: Accomplishments Theoretical foundations of memory-safety defect measurement shared and discussed with Dr. Paul E. Black (NIST) relationship to 27 CWE's illustrative application to lighttpd Software architecture and implementation (in progress) xml representation of CIL semantic constructs xml library function summaries interactive proof assistant progress monitor Benchmark programs (in progress) xml representation of lighttpd 9/12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 15
17 Schedule and Milestones IPA PM XML XML representation XML representation of representation code and of code and proofs of code and proofs proofs lighttpd nagios irssi pvm Scoring Tool Tool Report naim dovecot Sep Dec Mar June Sep 9/12/ DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP 16
18 Technology Transition SWAMP Scoring Tool Tool Report Ability to score and evaluate static analysis tools C prog ram CHCIL XML Preprocessed programs to lower entry barrier for new tool developers facilitate collaborative analysis 8/713 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 17
19 Contact Information Team: Henny Sipma, Principal Investigator Rich Barry, Program Manager Eric Bush Arnaud Venet (Consultant) Contact Information: Kestrel Technology, LLC 3260 Hillview Ave Palo Alto, CA tel. (650) /12/2013 CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS MEETING 18
Gold Standard Method for Benchmarking C Source Code Static Analysis Tools
Gold Standard Method for Benchmarking C Source Code Static Analysis Tools Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Henny Sipma Sr. Computer Scientist Kestrel Technology,
How To Develop A Static Analysis System For Large Programs
Towards the Industrial Scale Development of Custom Static Analyzers John Anton, Eric Bush, Allen Goldberg, Klaus Havelund, Doug Smith, Arnaud Venet Kestrel Technology LLC 4984 El Camino Real #230 Los Altos,
Using Static Code Analysis Tools for Detection of Security Vulnerabilities
Using Static Code Analysis Tools for Detection of Security Vulnerabilities Katerina Goseva-Popstajanova & Andrei Perhinschi Lane Deptartment of Computer Science and Electrical Engineering West Virginia
Visualizing Information Flow through C Programs
Visualizing Information Flow through C Programs Joe Hurd, Aaron Tomb and David Burke Galois, Inc. {joe,atomb,davidb}@galois.com Systems Software Verification Workshop 7 October 2010 Joe Hurd, Aaron Tomb
IKOS: A Framework for Static Analysis based on Abstract Interpretation (Tool Paper)
IKOS: A Framework for Static Analysis based on Abstract Interpretation (Tool Paper) Guillaume Brat, Jorge A. Navas, Nija Shi, and Arnaud Venet NASA Ames Research Center, Moffett Field, CA 94035 Abstract.
Code Dx: Visual analytics for triage of source code vulnerabilities
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Code Dx: Visual analytics for triage of source code vulnerabilities Secure Decisions, a division of Applied Visions, Inc. Anita D Amico Ken Prole September
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
A Technical Review of TIBCO Patterns Search
A Technical Review of TIBCO Patterns Search 2 TABLE OF CONTENTS SUMMARY... 3 ARCHITECTURAL OVERVIEW... 3 HOW DOES TIBCO PATTERNS SEARCH WORK?... 5 ELIMINATE THE NEED FOR RULES... 7 LOADING AND SYNCHRONIZING
Development Testing for Agile Environments
Development Testing for Agile Environments November 2011 The Pressure Is On More than ever before, companies are being asked to do things faster. They need to get products to market faster to remain competitive
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
Measuring the Effect of Code Complexity on Static Analysis Results
Measuring the Effect of Code Complexity on Static Analysis Results James Walden, Adam Messer, and Alex Kuhl Department of Computer Science Northern Kentucky University Highland Heights, KY 41099 Abstract.
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Detecting Critical Defects on the Developer s Desktop
Detecting Critical Defects on the Developer s Desktop Seth Hallem CEO Coverity, Inc. Copyright Coverity, Inc. 2006. All Rights Reserved. This publication, in whole or in part, may not be reproduced, stored
Oracle Solaris Studio Code Analyzer
Oracle Solaris Studio Code Analyzer The Oracle Solaris Studio Code Analyzer ensures application reliability and security by detecting application vulnerabilities, including memory leaks and memory access
Software security specification and verification
Software security specification and verification Erik Poll Security of Systems (SoS) group Radboud University Nijmegen Software (in)security specification and verification/detection Erik Poll Security
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Idea: Measuring the Effect of Code Complexity on Static Analysis Results
Idea: Measuring the Effect of Code Complexity on Static Analysis Results James Walden, Adam Messer, and Alex Kuhl Department of Computer Science Northern Kentucky University Highland Heights, KY 41099
STATIC CODE ANALYSIS Alexandru G. Bardas 1
Abstract STATIC CODE ANALYSIS Alexandru G. Bardas 1 A lot of the defects that are present in a program are not visible to the compiler. Static code analysis is a way to find bugs and reduce the defects
Streamlining BEA WebLogic Server Application Development. With VMware Infrastructure 3. With VMware Infrastructure 3
Streamlining BEA WebLogic Server Application Development Streamlining BEA WebLogic Server Application Development Contents Contents... 3 Introduction... 4 Product Overview... 5 BEA WebLogic Platform...5
The VMware Reference Architecture for Stateless Virtual Desktops with VMware View 4.5
The VMware Reference Architecture for Stateless Virtual Desktops with VMware View 4.5 R E F E R E N C E A R C H I T E C T U R E B R I E F Table of Contents Overview...................................................................
Please consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
Open-source Versus Commercial Software: A Quantitative Comparison
Open-source Versus Commercial Software: A Quantitative Comparison Rix Groenboom Reasoning NL BV [email protected] Agenda About Reasoning The Study Inspection Results Analysis Conclusions New
ECS 235A Project - NVD Visualization Using TreeMaps
ECS 235A Project - NVD Visualization Using TreeMaps Kevin Griffin Email: [email protected] December 12, 2013 1 Introduction The National Vulnerability Database (NVD) is a continuously updated United
Source Code Security Analysis Tool Functional Specification Version 1.0
Special Publication 500-268 Source Code Security Analysis Tool Functional Specification Version 1.0 Paul E. Black Michael Kass Michael Koo Software Diagnostics and Conformance Testing Division Information
Tackling Third-Party Patches
Tackling Third-Party Patches VMware vcenter Protect Update Catalog Delivers an Efficient, Effective Way to Extend an Organization s SCCM Infrastructure Technical WHITE PAPER Companies around the world
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security
Software Code Quality Checking (SCQC) No Clearance for This Secret: Information Assurance is MORE Than Security Nominee International Security Executives (ISE ) Information Security Project of the Year
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
Cloud Data Management Interface (CDMI) The Cloud Storage Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG
Cloud Data Management Interface (CDMI) The Cloud Storage Standard Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
The Road from Software Testing to Theorem Proving
The Road from Software Testing to Theorem Proving A Short Compendium of my Favorite Software Verification Techniques Frédéric Painchaud DRDC Valcartier / Robustness and Software Analysis Group December
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
Pattern Insight Clone Detection
Pattern Insight Clone Detection TM The fastest, most effective way to discover all similar code segments What is Clone Detection? Pattern Insight Clone Detection is a powerful pattern discovery technology
Static Analysis Tool Exposition (SATE) 2008
Special Publication 500-279 Static Analysis Tool Exposition (SATE) 2008 Editors: Vadim Okun Romain Gaucher Paul E. Black Software and Systems Division Information Technology Laboratory National Institute
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Evaluation of Load/Stress tools for Web Applications testing
May 14, 2008 Whitepaper Evaluation of Load/Stress tools for Web Applications testing CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: [email protected] web: www.hsc.com PROPRIETARY
Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives
Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services
Endpoint Security Solutions Comparative Analysis Report
Endpoint Security Solutions Comparative Analysis Report (Physical Environment) Vendors Tested Trend Micro McAfee Symantec Sophos Microsoft To: Trend Micro Indusface Contact Kandarp Shah Vice President
Testing for Security
Testing for Security Kenneth Ingham September 29, 2009 1 Course overview The threat that security breaches present to your products and ultimately your customer base can be significant. This course is
Service Availability Metrics
2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery
The Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Analysis Of Source Lines Of Code(SLOC) Metric
Analysis Of Source Lines Of Code(SLOC) Metric Kaushal Bhatt 1, Vinit Tarey 2, Pushpraj Patel 3 1,2,3 Kaushal Bhatt MITS,Datana Ujjain 1 [email protected] 2 [email protected] 3 [email protected]
Object Oriented Database Management System for Decision Support System.
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 3, Issue 6 (June 2014), PP.55-59 Object Oriented Database Management System for Decision
Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001
Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual routing is a software design method used to provide multiple independent routers that share
Redefining Static Analysis A Standards Approach. Mike Oara CTO, Hatha Systems
Redefining Static Analysis A Standards Approach Mike Oara CTO, Hatha Systems Software Analysis for Compliance Compliance Assessment Requires Software Analysis Dynamic Analysis Option Static Analysis Performed
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Verum white paper study ASD SaaS Business Case for Philips Healthcare
ASD SaaS Business Case for Philips Healthcare Author: Robert C. Howe Version: 1.0 EXECUTIVE SUMMARY Philips Healthcare Cardiovascular division has been using Verum s ASD:Suite for production software development
Transparent Monitoring of a Process Self in a Virtual Environment
Transparent Monitoring of a Process Self in a Virtual Environment PhD Lunchtime Seminar Università di Pisa 24 Giugno 2008 Outline Background Process Self Attacks Against the Self Dynamic and Static Analysis
Free Network Monitoring Software for Small Networks
Free Network Monitoring Software for Small Networks > WHITEPAPER Introduction Networks are becoming critical components of business success - irrespective of whether you are small or BIG. When network
Software Testing & Analysis (F22ST3): Static Analysis Techniques 2. Andrew Ireland
Software Testing & Analysis (F22ST3) Static Analysis Techniques Andrew Ireland School of Mathematical and Computer Science Heriot-Watt University Edinburgh Software Testing & Analysis (F22ST3): Static
The Eighth International Conference INCOSE_IL 2015. Formal Methods Security Tools in the Service of Cyber Security
The Eighth International Conference INCOSE_IL 2015 כלים ובדיקות Formal Methods Security Tools in the Service of Cyber Security Dr. Michael J. May Kinneret College on the Sea of Galilee 1 כלים ובדיקות /
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Continuous Prevention Testing
Continuous Prevention Testing By Andre Gironda OWASP October 2007 Bio Andre Gironda OWASP Phoenix, Chicago, MSP Other projects involved in WASC WASSEC NIST SAMATE Web Application Scanner Focus Group Web
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
CIA Lab Assignment: Web Servers
CIA Lab Assignment: Web Servers A. Bakker N. Sijm C. Dumitru J. van der Ham Feedback deadline: October 17, 2014 10:00 CET Abstract Web servers are an important way of putting information out on the Internet
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Testing and Source Code Auditing Secure Software Programming 2 Overview
The ROI from Optimizing Software Performance with Intel Parallel Studio XE
The ROI from Optimizing Software Performance with Intel Parallel Studio XE Intel Parallel Studio XE delivers ROI solutions to development organizations. This comprehensive tool offering for the entire
INTRODUCTION TO JAVA PROGRAMMING LANGUAGE
INTRODUCTION TO JAVA PROGRAMMING LANGUAGE Today Java programming language is one of the most popular programming language which is used in critical applications like stock market trading system on BSE,
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Efficiency Considerations of PERL and Python in Distributed Processing
Efficiency Considerations of PERL and Python in Distributed Processing Roger Eggen (presenter) Computer and Information Sciences University of North Florida Jacksonville, FL 32224 [email protected] 904.620.1326
MALAYSIAN PUBLIC SECTOR OPEN SOURCE SOFTWARE (OSS) PROGRAMME. COMPARISON REPORT ON NETWORK MONITORING SYSTEMS (Nagios and Zabbix)
MALAYSIAN PUBLIC SECTOR OPEN SOURCE SOFTWARE (OSS) PROGRAMME COMPARISON REPORT ON NETWORK MONITORING SYSTEMS (Nagios and Zabbix) JANUARY 2010 Phase II -Network Monitoring System- Copyright The government
The Data Quality Continuum*
The Data Quality Continuum* * Adapted from the KDD04 tutorial by Theodore Johnson e Tamraparni Dasu, AT&T Labs Research The Data Quality Continuum Data and information is not static, it flows in a data
Code Review Best Practices. With Adam Kolawa, Ph.D.
Code Review Best Practices With Adam Kolawa, Ph.D. This paper is part of a series of interviews in which Adam Kolawa Parasoft CEO and Automated Defect Prevention: Best Practices in Software Management
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork
University of Dayton Department of Computer Science Undergraduate Programs Assessment Plan DRAFT September 14, 2011
University of Dayton Department of Computer Science Undergraduate Programs Assessment Plan DRAFT September 14, 2011 Department Mission The Department of Computer Science in the College of Arts and Sciences
Developers and the Software Supply Chain. Andy Chou, PhD Chief Technology Officer Coverity, Inc.
Developers and the Software Supply Chain Andy Chou, PhD Chief Technology Officer Coverity, Inc. About Andy CTO at Coverity since 2010 Co-founder at Coverity, 2003 From five guys in a garage to 280 employees
Consulting Guide: Microsoft Exchange Solutions on VMware
Microsoft Exchange Solutions on VMware Contents 1. Overview... 3 2. Service Offerings... 4 2.1. Performance POC in a box... 4 2.1.1. Why Performance POC in a box?... 4 2.1.2. Objectives... 4 2.1.3. Success
Configuration Maximums VMware vsphere 4.0
Topic Configuration s VMware vsphere 4.0 When you select and configure your virtual and physical equipment, you must stay at or below the maximums supported by vsphere 4.0. The limits presented in the
Computer Science. Computer Science 213. Faculty and Offices. Degrees and Certificates Awarded. AS Computer Science Degree Requirements
Computer Science 213 Computer Science (See Computer Information Systems section for additional computer courses.) Degrees and Certificates Awarded Associate in Science Degree, Computer Science Certificate
The Security Development Lifecycle at SAP How SAP Builds Security into Software Products
SAP Security Concepts and Implementation The Security Development Lifecycle at SAP How SAP Builds Security into Software Products Table of Contents 4 Integrating Security Right from the Start 4 Establishing
Toward a lightweight framework for monitoring public clouds
Toward a lightweight framework for monitoring public clouds Kun Ma, Runyuan Sun, Ajith Abraham Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan, Jinan, China
Trustworthy Software Systems
Trustworthy Software Systems Greg Morrisett Cutting Professor of Computer Science School of Engineering & Applied Sciences Harvard University Little about me Research & Teaching Compilers, Languages, Formal
GenICam 3.0 Faster, Smaller, 3D
GenICam 3.0 Faster, Smaller, 3D Vision Stuttgart Nov 2014 Dr. Fritz Dierks Director of Platform Development at Chair of the GenICam Standard Committee 1 Outline Introduction Embedded System Support 3D
CCA CYBER SECURITY TRACK
CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014
Configuration Maximums VMware Infrastructure 3
Technical Note Configuration s VMware Infrastructure 3 When you are selecting and configuring your virtual and physical equipment, you must stay at or below the maximums supported by VMware Infrastructure
Týr: a dependent type system for spatial memory safety in LLVM
Týr: a dependent type system for spatial memory safety in LLVM Vítor De Araújo Álvaro Moreira (orientador) Rodrigo Machado (co-orientador) August 13, 2015 Vítor De Araújo Álvaro Moreira (orientador) Týr:
Automated Performance Testing of Desktop Applications
By Ostap Elyashevskyy Automated Performance Testing of Desktop Applications Introduction For the most part, performance testing is associated with Web applications. This area is more or less covered by
How To Use Open Source Software In Defence
Open Source Software in the Defence Industry Anthony Harrison Thales [email protected] Abstract: There are an increasing number of defence programmes incorporating open source software
Computer and Information Sciences
Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,
