2008
DOI: 10.1109/mc.2008.514
|View full text |Cite
|
Sign up to set email alerts
|

Automated Code Review Tools for Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
28
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(28 citation statements)
references
References 1 publication
0
28
0
Order By: Relevance
“…VCCs identified during code review contain vulnerabilities that could be eliminated prior to release, by using careful coding and review techniques. The longer it takes to detect and fix a security vulnerability, the more that vulnerability will cost [30]. Therefore, eliminating vulnerabilities early via careful coding and reviewing should help to reduce the cost of developing secure software.…”
Section: Introductionmentioning
confidence: 99%
“…VCCs identified during code review contain vulnerabilities that could be eliminated prior to release, by using careful coding and review techniques. The longer it takes to detect and fix a security vulnerability, the more that vulnerability will cost [30]. Therefore, eliminating vulnerabilities early via careful coding and reviewing should help to reduce the cost of developing secure software.…”
Section: Introductionmentioning
confidence: 99%
“…As a term, it is mostly used to describe the first phase of the compilation process. However, there is no difference between this phase and the method that we describe here (McGraw, 2008). The two differ only in the manipulation of their outcome.…”
Section: Lexical Analysismentioning
confidence: 92%
“…As a result there are several false positive and negative reports (Chess & West, 2007;Cowan, 2003). Note though, that lexical analysis utilities helped the gathering and depiction of a tentative set of security rules in one place for the first time (McGraw, 2008).…”
Section: Lexical Analysismentioning
confidence: 99%
“…There are several tools designed to meet these objectives, i.e., ITS4 [1], RATS [2]. However, most of the tools for code static analysis are intended for applications written in C. But the widespread development of Java EE Applications and the continuous emergence of frameworks for this purpose [3][4] [5], make necessary to count on a tool for analyzing vulnerabilities in applications written in Java.…”
Section: Introductionmentioning
confidence: 99%