Acknowledgement
Supported by : 한국연구재단
References
- T. Thornhill. (2014, January 21). Nearly half of South Koreans have their bank details stolen (including the President) as anti-fraud worker arrested [Online]. Available: http://www.dailymail.co.uk
- B. Xie and Q. Zhang, "Application-layer Anomaly Detection Based on Application-layer Protocols' Keywords," Proc. of 2012 2nd International Conference on Computer Science and Network Technology, pp. 2131-2135, 2012.
- H. Shahriar and M. Zulkernine, "Mitigating program security vulnerabilities: Approaches and challenges," ACM Computing Surveys, Vol. 44, No. 3, pp. 1-46, Jun. 2012.
- G. McGraw, Software security: building security in, Addison-Wesley Professional, 2006.
- J. Viega and G. McGraw, Building secure software: how to avoid security problems the right way, Pearson Education, 2001.
- Ministry of Government Administration and Home Affairs. (2014, May 27). C Secure Coding Guide for SW Development operator of e-government (3rd ed.) [Online]. Available: http://www.mogaha.go.kr (downloaded 2014, Dec. 11)
- Digital times. (2014, July 14). The government said expanding compulsory "Secure coding" [online]. Available: www.dt.co.kr
- J. Song. (2014, November 10). Sprout - Korean Programming Language Ensuring Run-Time Safety [Online]. Available: http://pl.pusan.ac.kr/sprout
- Carnegie Mellon University. Secure Coding | The CERT Division [Online]. Available: www.cert.org
- MITRE. CWE - Common Weakness Enumeration [Online]. Available: https://cwe.mitre.org
- S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng and X. Zheng, "Secure web applications via automatic partitioning," Proc. of twenty-first ACM SIGOPS Symposium on Operating Systems Principles, Vol. 41, No. 6, pp. 31-44, 2007.
- T. Tsai and N. Singh, "Libsafe: Transparent systemwide protection against buffer overflow attacks," Proc. of Dependable Systems and Networks 2002, pp. 541, 2002.
- Ministry of Government Administration and Home Affairs. (2014, May 27). Java Secure Coding Guide for SW Development operator of e-government (3rd ed.) [Online]. Available: http://www.mogaha.go.kr (downloaded 2014, Dec. 11)
- K. Tsipenyuk, B. Chess and G. McGraw, "Seven pernicious kingdoms: A taxonomy of software security errors," IEEE Security & Privacy, Vol. 3, No. 6, pp. 81-84, 2005. https://doi.org/10.1109/MSP.2005.159
- J. Lim, Seed is not C, BM media group, 1995.
- J. Yu and M. Lee, "Effects of a Programming Class Using Dolittle on Enhancing Creativity, Problem Solving Ability, and Interest in Programming," Journal of The Korean Association of Information Education, Vol. 13, No. 4, pp. 443-450, Dec. 2009. (in Korean)
Cited by
- Development of Safe Korean Programming Language Using Static Analysis vol.5, pp.4, 2016, https://doi.org/10.3745/KTCCS.2016.5.4.79