The Road from Software Testing to Theorem Proving
|
|
|
- Milo Bridges
- 10 years ago
- Views:
Transcription
1 The Road from Software Testing to Theorem Proving A Short Compendium of my Favorite Software Verification Techniques Frédéric Painchaud DRDC Valcartier / Robustness and Software Analysis Group December 2010
2 The Road 1 Copyright 2009 Dimension Films, 2929 Productions, Nick Wechsler Productions, Chockstone Pictures
3 The Road 2 Copyright 2010 TheMerryMonk.com
4 The Road The first principle is that you must not fool yourself - and you are the easiest person to fool. - Richard P. Feynman Copyright 2001 SoftLab-NSK Ltd. 3
5 Agenda Context A Selection of my Favorite Software Verification Techniques Implementation Level Testing Security Vulnerability Scanner Tools Specification/Design Level Discussion Architectural Risk Analysis Model Checking Lightweight Formal Methods Theorem Proving Decreasing level of familiarity among software developers 4
6 5 Context Where is DRDC?
7 Context DRDC s Mandate Defence R&D Canada ensures that the Canadian Forces are technologically prepared and operationally relevant by: Providing expert S&T advice to the Canadian Forces and Department of National Defence; Conducting research, development and analysis to contribute to new and improved defence capabilities; Anticipating and advising on future S&T trends, threats and opportunities; Engaging industrial, academic and international partners in the generation and commercialization of technology; Providing S&T for external customers to enhance Defence S&T capacity. 6
8 Context So What? Our main clients: Canadian Forces, Public Safety Canada, OGDs They use very little formal methods, no theorem proving Approximately ten years behind, and it is normal Applied research Little fundamental, academic research My group: two projects a year involving software development Few opportunities to experiment with various verification techniques Few people in DRDC know about formal methods Not much traction inside the organization The road I am presenting is a summarized compendium of the views I am promoting to my clients when I have an opportunity Not something I do everyday Comes from a lot of formal methods watch My usual focus is security 7
9 A Selection of my Favorite Software Verification Techniques Implementation Level Testing Key point: making sure that the test suite is large enough and contains effective test cases Large enough : Code coverage Statement coverage: implies function/method coverage Tricky for object-oriented code and exception handlers, requires fault injection Loop coverage: have all loops been executed at least twice? Helps to focus more specifically on loop conditions correctness Condition/decision coverage: when the correctness of the implemented tests in the application is important, e.g., control applications 8
10 9 A Selection of my Favorite Software Verification Techniques Implementation Level Testing (cont d) Large enough : Code coverage (cont d) Modified condition/decision coverage: when the correctness of the implemented tests in the application is paramount, e.g., safety-critical applications (DO-178B Level A) Effective test cases : Requirements-based testing: defining test cases from requirements helps to ensure that requirements are implemented correctly and completely by: having 100% success and 100% statement coverage after executing test suite Mutation testing: ensures that modifying the tested application s code, even very slightly, also modifies the end result of at least one test case in the test suite
11 A Selection of my Favorite Software Verification Techniques Implementation Level Testing (cont d) Pros Cons Very well-known and studied Intuitive for programmers Many supporting tools available for code coverage, test cases generation, mutation testing, etc, even freely Often not performed adequately (code coverage is not measured, no mutation testing, only unit testing, etc) False sense of correctness, fails during integration Important: testing often fails to show the presence of bugs Culture of Never design, write once, debug many 10
12 A Selection of my Favorite Software Verification Techniques Implementation Level Security Vulnerability Scanner Tools Key points: Pros Cons Increasing adoption, more than for other static analysis tools Scan often, use many Intuitive for programmers, fit very well in current build environments Minimal impact on management and development processes Overall quality of these tools increased significantly since 2005 Tendency to select only one tool judged as the best one, mostly from the tool s marketing Secure development and C&A processes slowly become centered around tools 11
13 A Selection of my Favorite Software Verification Techniques Specification/Design Level Architectural Risk Analysis Key points: Structured and practical process to consider security at the architectural level, either during new design or for legacy applications Cigital Inc. is the main pioneer My process contains Cigital s activities integrated within the usual risk analysis process Cigital does not reveal its entire process 12
14 Architectural Risk Analysis Process Attacker s perspective Software architecture documentation Step 1. System characterization Foundation Defender s Manager s of everything perspective else One-page overview Step 2. Threat identification History of system attacks Sources of intelligence Step 3. Vulnerability identification Security testing results Step 4. Control analysis Planned controls Step 6. Impact analysis Threat statement Vulnerability statement List of controls Step 5. Attack likelihood determination Attack likelihood rating Impact rating Step 7. Risk determination Rated risks One-page overview Step 8. Control recommendations Step 9. Results documentation Recommended controls or modifications Software Architectural Risk Analysis report 13
15 14 Common Attack Pattern Enumeration and Classification (CAPEC, see capec.mitre.org)
16 Common Weakness Enumeration (CWE, see cwe.mitre.org) Security Vulnerability Scanner Tools 15
17 A Selection of my Favorite Software Verification Techniques Specification/Design Level Architectural Risk Analysis (cont d) Pros Cons Practical: even though it is framed inside a process, developers are really finding security flaws Helps to find higher-level security issues, not only buffer overflows, format strings, etc Compatible with usual Software Development Life Cycles In immature organizations, it requires efforts to modify current, usually ad hoc, development processes Requires trained personnel in security to take the attacker s perspective 16
18 A Selection of my Favorite Software Verification Techniques Specification/Design Level Model Checking Key point: given a formal model of a system, it verifies automatically whether this model meets a given formal specification Pros Cons Generic: theories have been developed for many types of models (timed, stochastic, etc) and specification logics (temporal, modal, etc) Most tools now handle the state explosion problem to an acceptable extent In software model checking, most useful logics in practice (more expressive than propositional and monadic predicate logics) are hardly tractable, semidecidable or undecidable so it can fail to prove or disprove a given property It can be very difficult to produce a correct but yet abstract model of a system Requires trained and dedicated personnel to analyze the results 17
19 A Selection of my Favorite Software Verification Techniques Specification/Design Level Lightweight Formal Methods Key points: Coined by Prof. Daniel Jackson at the MIT (see alloy.mit.edu) Benefit from the precision of mathematical thinking and linguistic advantages of formal methods while sacrificing enough language expressiveness to get simplicity and a fully-automated mechanical analysis that is effective at finding errors In some sense, they could be named Pragmatic Formal Methods (but sounds pedant) or Formal Testing (but sounds pejorative and is too restrictive) 18
20 A Selection of my Favorite Software Verification Techniques Specification/Design Level Lightweight Formal Methods (cont d) Pros Best of many worlds: smaller languages, easier to learn, concepts closer to programmers mindsets, good tools support, application- and domain-specific Con (comment) I believe many formal methods fall into this more friendly category but are unfortunately not presented with this perspective: modern compilers (!), automatic static analysis tools, model checking, SAT solvers, first-order automatic theorem proving, etc 19
21 A Selection of my Favorite Software Verification Techniques Specification/Design Level Theorem Proving Key point: prove that some generic formal properties, such as consistency or completeness, are valid in a formally-defined specification Pros Cons Proves the absence of errors (with respect to the verified properties), no partial error detection anymore Backed by fifty years of research and development, world-wide First-order theorem proving now enjoys very efficient, effective and some fully-automatic tools Formal specification and theorem proving are very complex on mainstream software developers scale With interactive theorem proving (more expressive logics), the cost of proof (analysis) is usually an order of magnitude greater than the cost of formal specification, which is already high 20
22 Discussion Comments Relating these Techniques to DO-178B/C Certification Testing Until we can formally specify the entire aircraft platform systems (hardware and software), we will have to perform some software testing (at the very least integration testing) to verify that the software works correctly in its environment. Security Vulnerability Scanner Tools Note: In the context of DO-178B/C, these tools are not security-enforcing tools but more generically correctnessenforcing tools (static and dynamic). Tools must be qualified but are still incomplete (especially taken individually) and potentially incorrect (except if qualification is infallible). Cross-verifying one tool s results with one or more other tools should be discussed (if not already in DO-178C). 21
23 Discussion Comments Relating these Techniques to DO-178B/C Certification Architectural Risk Analysis Note: If you switch its focus from security to safety and rename it Threat and Risk Assessment (TRA), you get a process already performed in Safety Engineering which can be used to progress more smoothly towards formal methods adoption. For organizations with a small or inexistent culture of correctness, forcing the adoption of formal methods is unrealistic. Model Checking/Lightweight Formal Methods/Theorem Proving The qualification of these tools is at least discussed in DO- 178B/C; the process is still imperfect but was refined. But the processes and culture behind formal methods must still be mapped onto and integrated into DO-178B/C required objectives by the organizations that want to get the certification. 22
24 Discussion From the List of Just-in-Time Topics Prepared Ahead of the Workshop Conservative Representation (ref DO-178C): A conservative representation is sound with respect to the original representation but incomplete. Thus, every property true of the conservative representation can be mapped to a true property of the original representation (sound). But not every property true of the original representation is true of the conservative representation (incomplete). Necessary Low-Level Software Requirements (ref DO-178C): It is a requirements traceability problem. First, you need to formalize all high-level and low-level software requirements. Second, you need to find minimal sets of low-level software requirements so that each set entails one or more high-level software requirements. Finally, you need to show that every lowlevel software requirement is a member of at least one set. In other words, low-level requirements must constitute a correct and minimal step-wise refinement of high-level requirements. Additionally, you could show that every high-level software requirement is entailed. 23
25 Discussion From the List of Just-in-Time Topics Prepared Ahead of the Workshop Avoidance of Unintended Functionality (ref DO-178C): It is another requirements traceability problem. The implementation must be formal, i.e., you must have a complete formal semantics for its programming language. Using the same principle than in the Necessary Low-Level Software Requirements topic, you must show that the code is a correct and minimal step-wise refinement of low-level requirements. Soundness of a Theorem-Proving Approach (ref DO-178C): My interpretation is that the intent behind soundness here is in line with the Conservative Representation topic. A theoremproving approach is sound if it works on conservative representations, or we might say sound representations (but not necessarily complete), with respect to the reality being modeled. 24
26 Discussion From the List of Just-in-Time Topics Prepared Ahead of the Workshop Assurance Cases : Interactive theorem proving can be used to verify the validity of assurance cases already developed (say, manually). They can also support the development of new assurance cases by validating each step and performing some of the steps automatically. 25
27 26
SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE. Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.
SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE Cheryl A. Dorsey Digital Flight / Solutions [email protected] DIGITAL FLIGHT / SOLUTIONS Presentation Outline DO-178 Overview
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
Certification Authorities Software Team (CAST) Position Paper CAST-13
Certification Authorities Software Team (CAST) Position Paper CAST-13 Automatic Code Generation Tools Development Assurance Completed June 2002 NOTE: This position paper has been coordinated among the
Certification Authorities Software Team (CAST) Position Paper CAST-26
Certification Authorities Software Team (CAST) Position Paper CAST-26 VERIFICATION INDEPENDENCE COMPLETED January 2006 (Rev 0) NOTE: This position paper has been coordinated among the software specialists
Access Control Fundamentals
C H A P T E R 2 Access Control Fundamentals An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g., users, processes, etc.) to perform operations (e.g., read,,
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Testing and Source Code Auditing Secure Software Programming 2 Overview
How To Improve Software Quality
Software Qualities Quality Assurance Maintainer Go Documentation Readable Ce Go Design Functionality Ease of use Ease of learning User Reliability Correctness Efficiency Low Cost Portability Increased
Software Verification and System Assurance
Software Verification and System Assurance John Rushby Based on joint work with Bev Littlewood (City University UK) Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Verification
Parameters for Efficient Software Certification
Parameters for Efficient Software Certification Roland Wolfig, [email protected] Vienna University of Technology, Real-Time Systems Group 1 Abstract Software certification is a common approach
New Challenges In Certification For Aircraft Software
New Challenges In Certification For Aircraft Software John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Aircraft Software Certification 1 Overview The basics
The Impact of RTCA DO-178C on Software Development
Cognizant 20-20 Insights The Impact of RTCA DO-178C on Software Development By following DO-178C, organizations can implement aeronautical software with clear and consistent ties to existing systems and
FROM SAFETY TO SECURITY SOFTWARE ASSESSMENTS AND GUARANTEES FLORENT KIRCHNER (LIST)
FROM SAFETY TO SECURITY SOFTWARE ASSESSMENTS AND GUARANTEES FLORENT KIRCHNER (LIST) M loc 12 ONBOARD SOFTWARE SIZE 10 Volt (2011) F-35 (2012) 8 6 787 (2010) F-35 (2010) 4 2 F-22 (2005) 0 WHY DO WE TRUST
Meeting DO-178B Software Verification Guidelines with Coverity Integrity Center
Meeting DO-178B Software Verification Guidelines with Coverity Integrity Center May, 2009 Thomas Schultz Director of Product Strategy, Coverity, Inc. Executive Summary Development organizations that create
Automated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
Reduce Medical Device Compliance Costs with Best Practices. [email protected]
Reduce Medical Device Compliance Costs with Best Practices [email protected] 1 Agenda Medical Software Certification How new is Critical Software Certification? What do we need to do? What Best Practises
What Is Assurance? John Rushby Based on joint work with Bev Littlewood (City University UK)
What Is Assurance? John Rushby Based on joint work with Bev Littlewood (City University UK) Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I What Is Assurance? 1 A Conundrum
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 6 : Product Development Software Level
ISO 26262 the Emerging Automotive Safety Standard Agenda Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 4 : Product Development System Level Part 6 : Product Development
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
Software testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
DO-178B compliance: turn an overhead expense into a competitive advantage
IBM Software Rational Aerospace and Defense DO-178B compliance: turn an overhead expense into a competitive advantage 2 DO-178B compliance: turn an overhead expense into a competitive advantage Contents
SCADE SUITE SOFTWARE VERIFICATION PLAN FOR DO-178B LEVEL A & B
SCADE SUITE SOFTWARE VERIFICATION PLAN FOR DO-78B LEVEL A & B TABLE OF CONTENTS. INTRODUCTION..... PURPOSE..... RELATED DOCUMENTS..... GLOSSARY... 9.. CONVENTIONS..... RELATION WITH OTHER PLANS....6. MODIFICATION
Trustworthy Software Systems
Trustworthy Software Systems Greg Morrisett Cutting Professor of Computer Science School of Engineering & Applied Sciences Harvard University Little about me Research & Teaching Compilers, Languages, Formal
Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015
For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6
Extending AADL for Security Design Assurance of the Internet of Things
Extending AADL for Security Design Assurance of the Internet of Things Presented by Rick Kazman, PhD Team: Carol Woody (PI), Rick Kazman, Robert Ellison, John Hudak, Allen Householder Software Engineering
Formal Verification and Linear-time Model Checking
Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging
Creating Competitive Advantage: The role for ALM in the PLM world
Creating Competitive Advantage: The role for ALM in the PLM world Michael Azoff Principal Analyst, Ovum [email protected] Version 9 Oct, 2014 1 Copyright Ovum. All rights reserved. Ovum is a subsidiary
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
Software Development: The Waterfall Model
Steven Zeil June 7, 2013 Contents 1 Software Development Process Models 2 1.1 Components of the Waterfall Model................................. 2 1.1.1 What is a requirement?. 2 1.1.2 Testing..........
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
Software Process for QA
Software Process for QA Basic approaches & alternatives CIS 610, W98 / M Young 1/7/98 1 This introduction and overview is intended to provide some basic background on software process (sometimes called
To introduce software process models To describe three generic process models and when they may be used
Software Processes Objectives To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software
Embedded Systems Conference April 3-7, San Jose [ESC-447] Safety-Critical Design Techniques for Secure and Reliable Systems
Embedded Systems Conference April 3-7, San Jose [ESC-447] Safety-Critical Design Techniques for Secure and Reliable Systems Robert B. K. Dewar AdaCore [email protected] What is a Safety Critical Program?
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
Effective Software Verification for Medical Devices
STERLINGTECH AND KLOCWORK WHITE PAPER NOVEMBER 2009 Effective Software Verification for Medical Devices Achieving compliance and meeting productivity goals with static analysis In addition to producing
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
X05. An Overview of Source Code Scanning Tools. Loulwa Salem. Las Vegas, NV. IBM Corporation 2006. IBM System p, AIX 5L & Linux Technical University
X05 An Overview of Source Code Scanning Tools Loulwa Salem Las Vegas, NV Objectives This session will introduce better coding practices and tools available to aid developers in producing more secure code.
Introduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
WIND RIVER RTCA DO-178 SOFTWARE CERTIFICATION SERVICES
WIND RIVER RTCA DO-178 SOFTWARE CERTIFICATION SERVICES Wind River Professional Services RTCA DO-178 Practice provides software certification services to help our customers address their demanding software
F-22 Raptor. Agenda. 1. Motivation
Model-Based Software Development and Automated Code Generation for Safety-Critical Systems F-22 Raptor for the Seminar Advanced Topics in Software Engineering for Safety-Critical Systems Cause: Bug in
Information Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)
S Information Technology Security Evaluation Criteria ITSEC Joint Interpretation Library (ITSEC JIL) Version 2.0 November 1998 This document is paginated from i to vi and from 1 to 65 ITSEC Joint Interpretation
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
The Course. http://www.cse.unsw.edu.au/~cs3153/
The Course http://www.cse.unsw.edu.au/~cs3153/ Lecturers Dr Peter Höfner NICTA L5 building Prof Rob van Glabbeek NICTA L5 building Dr Ralf Huuck NICTA ATP building 2 Plan/Schedule (1) Where and When Tuesday,
Metrics, Methods and Tools to Measure Security and Trustworthiness. Measuring trustworthiness
Metrics, Methods and Tools to Measure Security and Trustworthiness Henrique Madeira, University of Coimbra, Portugal Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS) Cascais, June 29
CS 3719 (Theory of Computation and Algorithms) Lecture 4
CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a
Payment Card Industry (PCI) Terminal Software Security. Best Practices
Payment Card Industry (PCI) Terminal Software Security Best Version 1.0 December 2014 Document Changes Date Version Description June 2014 Draft Initial July 23, 2014 Core Redesign for core and other August
DO-178B/C Differences Tool
FAA/AVS DO-178B/C Differences Tool Revision: 8 DATE: 9/16/213 Revision History Date Rev Change summary 7/21/213 Draft 1 Draft Release - prototype 7/22/213 Draft 2 Draft Release for review 7/23/213 Draft
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Software Paradigms (Lesson 1) Introduction & Procedural Programming Paradigm
Software Paradigms (Lesson 1) Introduction & Procedural Programming Paradigm Table of Contents 1 Introduction... 2 1.1 Programming Paradigm... 2 1.2 Software Design Paradigm... 3 1.2.1 Design Patterns...
Formal Specification and Programming for SDN
Formal Specification and Programming for SDN relevant ID: draft-shin-sdn-formal-specification-01 Myung-Ki Shin, Ki-Hyuk Nam ETRI Miyoung Kang, Jin-Young Choi Korea Univ. Proposed SDN RG Meeting@IETF 84
3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013
PROGRAMME SPECIFICATION FOR MSc IN COMPUTER SCIENCE 1. Awarding institution/body University of Oxford 2. Teaching institution University of Oxford 3. Programme accredited by Currently accredited by the
Points of View. CxO s point of view. Developer s point of view. Attacker s point of view
Web App Security 2 CxO s point of view Points of View Measurable security SCAP (Security Content Automation Protocol) Developer s point of view Secure coding/software security CWE (Common Weakness Enumeration)
Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability
White Paper Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability What You Will Learn This document discusses application centric infrastructure
Datavetenskapligt Program (kandidat) Computer Science Programme (master)
Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
Access Governance. Delivering value. What you gain. Putting a project back on track for success
What you gain Risk-managed access Having a second line of defence to identify what needs to be controlled and who owns it lowers your operational costs, while taking a risk-based approach ensures greater
Software Engineering Techniques
Software Engineering Techniques Low level design issues for programming-in-the-large. Software Quality Design by contract Pre- and post conditions Class invariants Ten do Ten do nots Another type of summary
Model Checking of Software
Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving
How to Avoid an Attack - Security Testing as Part of Your Software Testing Process
How to Avoid an Attack - Security Testing as Part of Your Software Testing Process Recent events in the field of information security, which have been publicized extensively in the media - such as the
White Paper. Blindfolded SQL Injection
White Paper In the past few years, SQL Injection attacks have been on the rise. The increase in the number of Database based applications, combined with various publications that explain the problem and
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Introduction to Formal Methods. Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm
Introduction to Formal Methods Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm Outline Introduction Formal Specification Formal Verification Model Checking Theorem Proving Introduction Good papers to
MatriXay Database Vulnerability Scanner V3.0
MatriXay Database Vulnerability Scanner V3.0 (DAS- DBScan) - - - The best database security assessment tool 1. Overview MatriXay Database Vulnerability Scanner (DAS- DBScan) is a professional tool with
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
Module 1. Introduction to Software Engineering. Version 2 CSE IIT, Kharagpur
Module 1 Introduction to Software Engineering Lesson 2 Structured Programming Specific Instructional Objectives At the end of this lesson the student will be able to: Identify the important features of
Certification of a Scade 6 compiler
Certification of a Scade 6 compiler F-X Fornari Esterel Technologies 1 Introduction Topic : What does mean developping a certified software? In particular, using embedded sofware development rules! What
REAL SECURITY IS DIRTY
REAL SECURITY IS DIRTY INFORMATION SECURITY AND RISK MANAGEMENT ARE PURSUITS OF BRUTAL SELF- REFLECTION. The most logical business decisions come from facing ugly truths. Before any business spends a dime
Chapter 8 Software Testing
Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is
Introduction to Software Paradigms & Procedural Programming Paradigm
Introduction & Procedural Programming Sample Courseware Introduction to Software Paradigms & Procedural Programming Paradigm This Lesson introduces main terminology to be used in the whole course. Thus,
Quotes from Object-Oriented Software Construction
Quotes from Object-Oriented Software Construction Bertrand Meyer Prentice-Hall, 1988 Preface, p. xiv We study the object-oriented approach as a set of principles, methods and tools which can be instrumental
SCADE Suite in Space Applications
SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T
Advanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16
Advanced compiler construction Michel Schinz 2007 03 16 General course information Teacher & assistant Course goals Teacher: Michel Schinz [email protected] Assistant: Iulian Dragos INR 321, 368 64
TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.
CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express
"Practical Security Testing for Web Applications"
T10 Track 5/7/2009 11:15:00 AM "Practical Security Testing for Web Applications" Presented by: Rafal Los Hewlett-Packard Application Security Center Presented at: 330 Corporate Way, Suite 300, Orange Park,
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html
Software security specification and verification
Software security specification and verification Erik Poll Security of Systems (SoS) group Radboud University Nijmegen Software (in)security specification and verification/detection Erik Poll Security
Source Code Security Analysis Tool Functional Specification Version 1.0
Special Publication 500-268 Source Code Security Analysis Tool Functional Specification Version 1.0 Paul E. Black Michael Kass Michael Koo Software Diagnostics and Conformance Testing Division Information
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
Verification and Validation of Software Components and Component Based Software Systems
Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research [email protected]
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
A Survey on Requirements and Design Methods for Secure Software Development*
A Survey on Requirements and Design Methods for Secure Software Development* Muhammad Umair Ahmed Khan and Mohammad Zulkernine School of Computing Queen s University Kingston, Ontario, Canada K7L 3N6 {umair
Buyer Beware: How To Be a Better Consumer of Security Maturity Models
Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University [email protected] Nader Mehravari Software
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
SD Elements: A Tool for Secure Application Development Management
SD Elements: A Tool for Secure Application Development Management Golnaz Elahi 1, Tom Aratyn 2, Ramanan Sivaranjan 2, Rohit Sethi 2, and Eric Yu 3 1 Department of Computer Science, University of Toronto,
CSCI E 98: Managed Environments for the Execution of Programs
CSCI E 98: Managed Environments for the Execution of Programs Draft Syllabus Instructor Phil McGachey, PhD Class Time: Mondays beginning Sept. 8, 5:30-7:30 pm Location: 1 Story Street, Room 304. Office
