DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Security bug
Security bug
BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
How to Analyze the Cyber Threat from Drones
The CLASP Application Security Process
Threats and Vulnerabilities in Federation Protocols and Products
Fuzzing with Code Fragments
Paul Youn from Isec Partners
Designing New Operating Primitives to Improve Fuzzing Performance
Empirical Analysis and Automated Classification of Security Bug Reports
Functional and Non Functional Requirements
Software Bug Bounties and Legal Risks to Security Researchers Robin Hamper
Detecting Lacking-Recheck Bugs in OS Kernels
Identifying Software and Protocol Vulnerabilities in WPA2 Implementations Through Fuzzing
Security Report 2 Cisco 2014 Midyear Security Report
Supreme Court of the United States
New Crypto Currency Mining Malware Also Disables Security Services
Oracle Software Security Assurance Oracle’S Methodology for the Development and Maintenance of Security in Its Products
Bugs in the Market: Creating a Legitimate, Transparent, and Vendor-Focused Market for Software Vulnerabilities
Ethics, Law, and Policy
Top View
An Analysis of Post Hoc Security Techniques
Bug Hunting: the Seven Ways of the Security Samurai
Seven Steps to Reducing Software Security Risks | RBCS
Addressing Security Issues in Linux
Application Security by Design
Understanding the Reproducibility of Crowd-Reported Security Vulnerabilities
Fuzzing for Software Security Testing and Quality Assurance Ch00fm 5053.Qxp 5/19/08 12:45 PM Page Ii
Software Security Knowledge Area (Draft for Comment)
Stepping on the Security Scale
Secure Development: Towards Approval
Reflections on Re-Balancing the Attacker's Asymmetric Advantage
Identification of Security Related Bug Reports Via Text Mining Using
The Law and Economics of Bug Bounties
Application Software Security and the CIS Controls a Reference Paper
On Security Measures for Containerized Applications Imaged with Docker
The Heartbleed
Onfronting Cyberconflict
Trend Micro Security Predictions for 2015 and Beyond