Institution
Fortify Software
About: Fortify Software is a based out in . It is known for research contribution in the topics: Software security assurance & Security bug. The organization has 8 authors who have published 11 publications receiving 1110 citations.
Topics: Software security assurance, Security bug, Executable, Software, Security information and event management
Papers
More filters
01 Nov 2004
TL;DR: This work looks at how to automate source-code security analysis with static analysis tools and finds a simple and efficient way to do so.
Abstract: All software projects are guaranteed to have one artifact in common $source code. Together with architectural risk analysis, code review for security ranks very high on the list of software security best practices. We look at how to automate source-code security analysis with static analysis tools.
372 citations
Patent•
25 Aug 2006TL;DR: In this paper, the authors propose to insert protective instructions into program instructions to detect and respond to attacks during execution of the program instructions, such as injection vulnerabilities, potential repetitive attacks, sensitive information, and HTTP attributes.
Abstract: A computer readable storage medium has executable instructions to perform an automated analysis of program instructions. The automated analysis includes at least two analyses selected from an automated analysis of injection vulnerabilities, an automated analysis of potential repetitive attacks, an automated analysis of sensitive information, and an automated analysis of specific HTTP attributes. Protective instructions are inserted into the program instructions. The protective instructions are utilized to detect and respond to attacks during execution of the program instructions.
310 citations
01 Nov 2005
TL;DR: This new taxonomy is made up of two distinct kinds of sets, which the authors're stealing from biology: a phylum (a type of coding error, such as illegal pointer value) and a kingdom (a collection of phyla that shares a common theme,such as input validation and representation).
Abstract: Taxonomies can help software developers and security practitioners understand the common coding mistakes that affect security. The goal is to help developers avoid making these mistakes and more readily identify security problems whenever possible. Because developers today are by and large unaware of the security problems they can (unknowingly) introduce into code, a taxonomy of coding errors should provide a real tangible benefit to the software security community. Although the taxonomy proposed here is incomplete and imperfect, it provides an important first step. It focuses on collecting common errors and explaining them in a way that makes sense to programmers. This new taxonomy is made up of two distinct kinds of sets, which we're stealing from biology: a phylum (a type of coding error, such as illegal pointer value) and a kingdom (a collection of phyla that shares a common theme, such as input validation and representation). Both kingdoms and phyla naturally emerge from a soup of coding rules relevant to enterprise software, and it's for this reason that this taxonomy is likely to be incomplete and might lack certain coding errors. In some cases, it's easier and more effective to talk about a category of errors than to talk about any particular attack. Although categories are certainly related to attacks, they aren't the same as attack patterns.
215 citations
Patent•
12 May 2005TL;DR: In this article, a static analysis of program instructions for security vulnerabilities is performed during a development phase of the program instructions to identify security vulnerabilities and the security vulnerabilities are used to apply a security test (131) to program instructions during a testing phase.
Abstract: A method of analyzing program instructions for security vulnerabilities includes applying a static analysis to program instructions during a development phase of the program instructions to identify security vulnerabilities (124). The security vulnerabilities are used to apply a security test (131) to the program instructions during a testing phase of the program instructions. The security vulnerabilities are analyzed to develop security monitoring criteria (118) to apply to the program instructions during a deployment phase of the program instructions.
58 citations
Patent•
10 Dec 2004TL;DR: In this paper, executable instructions are used to identify potential security vulnerabilities within program instructions based upon input from an attack database and information derived during a static analysis of the program instructions, and performance results from the vulnerability tests are analyzed.
Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. Executable instructions identify potential security vulnerabilities within program instructions based upon input from an attack database and information derived during a static analysis of the program instructions. Vulnerability tests are applied to the program instructions in view of the security vulnerabilities. Performance results from the vulnerability tests are analyzed. The performance results are then reported.
53 citations
Authors
Showing all 8 results
Name | H-index | Papers | Citations |
---|---|---|---|
Brian Chess | 8 | 11 | 540 |
B. Chess | 4 | 4 | 588 |
Roger Thornton | 3 | 4 | 421 |
Jacob West | 2 | 4 | 247 |
Arthur Do | 2 | 2 | 368 |
Sean Fay | 1 | 1 | 58 |
Edward Lee | 1 | 1 | 35 |
K. Tsipenyuk | 1 | 1 | 204 |