Reliable Software

Displaying 1-1 of 1 results

  • White Papers // Jan 2009

    Towards Analyzing Security-Critical Software During Development

    It describes an approach and tool for analyzing the vulnerability of software applications to anomalous events and malicious threats during software development. Traditionally, security analysis has been applied at the network system level, after release, using tiger team approaches. After a successful tiger team penetration, specific system vulnerabilities are patched....

    Provided By Reliable Software

  • White Papers // Jan 2009

    Towards Analyzing Security-Critical Software During Development

    It describes an approach and tool for analyzing the vulnerability of software applications to anomalous events and malicious threats during software development. Traditionally, security analysis has been applied at the network system level, after release, using tiger team approaches. After a successful tiger team penetration, specific system vulnerabilities are patched....

    Provided By Reliable Software