Download Now Free registration required
It describes an approach and tool for analyzing the vulnerability of software applications to anomalous events and malicious threats during software development. Traditionally, security analysis has been applied at the network system level, after release, using tiger team approaches. After a successful tiger team penetration, specific system vulnerabilities are patched. It makes a case for applying software engineering analysis techniques that have proven successful in the software safety arena to security-critical software code.
- Format: PDF
- Size: 258.1 KB