1 |
James A. Whittaker and Herbert H. Thompson, 'How to break software security,' Addison-Wesley, 2003
|
2 |
http://www.coresecurity.com
|
3 |
http://www.cert.org
|
4 |
W. Arbaugh, W. Fithen and J. Mchugh, 'Windows of vulnerability : A case study analysis,' IEEE Computer, Vol.33, No.12, pp.52-59, 2000
DOI
ScienceOn
|
5 |
H. Thompson, J. Whittaker and F. Moatty 'Software Security Vulnerability Testing In Hostile Environments,' In Proceedings of the 17th ACM Software Applications Conference, pp.260-264, 2002
DOI
|
6 |
E. Clarked and J. Wing, 'Formal methods : State of the art and future directions,' ACM Computing Surveys, Vol. 28, No. 4, pp.626-643, 1996
DOI
ScienceOn
|
7 |
C. Pfleeger, S. Pfleeger and M. Theofanos, 'A methodology for penetration testing,' Computers and Security, Vol. 8, No.2, pp.613-620, 1990
|
8 |
James A. Whittaker, 'How to break software,' Addison-Wesley, 2002
|
9 |
http://www.securityfocus.com
|
10 |
http://cve.mitre.org
|
11 |
P. Broadwell and E. Ong, 'A comparison of static analysis and fault injection techniques for developing robust system services,' Technical report, Computer Science Division, University of California, Berkeley, 2002
|
12 |
D. Peled, 'Software reliability methods,' Springer, 2001
|
13 |
http://www.securityinnonation.com
|
14 |
http://www.immunitysec.com
|