2016
DOI: 10.6028/nist.ir.8151
|View full text |Cite
|
Sign up to set email alerts
|

Dramatically reducing software vulnerabilities: Report to the White House Office of Science and Technology Policy

Abstract: The call for a dramatic reduction in software vulnerability is heard from multiple sources, recently from the February 2016 Federal Cybersecurity Research and Development Strategic Plan. This plan starts by describing well known risks: current systems perform increasingly vital tasks and are widely known to possess vulnerabilities. These vulnerabilities are often not easy to discover and difficult to correct. Cybersecurity has not kept pace, and the pace that is needed is rapidly accelerating. The goal of this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 41 publications
0
13
0
Order By: Relevance
“…For an overview of formal methods, including suggested techniques and further reading, we refer the reader to Section 2.1 of [23].…”
Section: Model Checkers and Other Lightweight Formal Methodsmentioning
confidence: 99%
“…For an overview of formal methods, including suggested techniques and further reading, we refer the reader to Section 2.1 of [23].…”
Section: Model Checkers and Other Lightweight Formal Methodsmentioning
confidence: 99%
“…This document defines an app vetting process and provides guidance on (1) planning and implementing an app vetting process, (2) developing security requirements for mobile apps, (3) identifying appropriate tools for testing mobile apps and (4) determining if a mobile app is acceptable for deployment on an organization's mobile devices. An overview of techniques commonly used by software assurance professionals is provided, including methods of testing for discrete software vulnerabilities and misconfigurations related to mobile app software.…”
Section: Purposementioning
confidence: 99%
“…Software assurance activities for a mobile application may occur in one or more phases of the mobile application lifecycle: (1) during the development of the app by its developer (i.e., the app development phase), (2) after receiving a developed app but prior to its deployment by the enduser organization (i.e., the app acquisition phase) or (3) during deployment of the app by the enduser organization (i.e., the app deployment phase). These three phases of the mobile application lifecycle are shown in Figure 1.…”
Section: Scopementioning
confidence: 99%
See 2 more Smart Citations