12.07.2015 Views

Secure Coding SwA Pocket Guide - Build Security In - US-CERT

Secure Coding SwA Pocket Guide - Build Security In - US-CERT

Secure Coding SwA Pocket Guide - Build Security In - US-CERT

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Resources» <strong>Build</strong><strong>Security</strong><strong>In</strong> White Box Testing resources. 9 September 2009. United States Government.Department of Homeland <strong>Security</strong>. 28 July 2010.» <strong>Build</strong><strong>Security</strong><strong>In</strong> Code Analysis resources. 14 November 2008. United States Government.Department of Homeland <strong>Security</strong>. 28 July 2010.» <strong>Secure</strong> Programming with Static Analysis. Chess, Brian and Jacob West. <strong>In</strong>dianapolis, <strong>In</strong>diana:Addison-Wesley, 2007.» “Fundamental Practices for <strong>Secure</strong> Software Development: A <strong>Guide</strong> to the Most Effective <strong>Secure</strong>Development Practices in Use Today.” SAFECode.org. Ed. Stacy Simpson. 8 October 2008. TheSoftware Assurance Forum for Excellence in Code [SAFECode]. 13 July 2010.» “Application <strong>Guide</strong>.” Grembi, Jason. 1 March, 2007. Sterling Connect, LLC.» “A Process for Performing <strong>Security</strong> Code Reviews.” Howard, Michael. IEEE <strong>Security</strong> and PrivacyVolume 4 Number 4, July/August 2006: 74-79. 28 July 2010.» “<strong>In</strong>put validation of client-server Web applications through static analysis.” Hsu, Francis. Universityof California Davis – Department of Computer Science. 14 May 2007. 28 July 2010.» NIST SAMATE - Software Assurance Metrics And Tool Evaluation. July 2005. United StatesGovernment. National <strong>In</strong>stitute of Standards and Technology. 28 July 2010.» “OWASP Code Review Project page.” OWASP.org. 20 January 2010. The Open Web Application<strong>Security</strong> Project [OWASP]. 28 July 2010.» “<strong>Security</strong> Code Review <strong>Guide</strong>lines.” Shostack, Adam. Adam Shostack’s Personal Homepage. May2000. 28 September 2010 .» “Pattern Matching <strong>Security</strong> Properties of Code using Dependence Graphs”. Wilander, John and PiaFåk. John Wilander's Research Publications (peer-reviewed), 7 November 2005. LinköpingUniversity, Department of Computer and <strong>In</strong>formation Science. 27 July 2010.Software Assurance <strong>Pocket</strong> <strong>Guide</strong> Series:Development Volume VI – Version 2.0, , May 18, 2012<strong>Secure</strong> <strong>Coding</strong>13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!