A Catalog of Security-oriented Program Transformations

@inproceedings{Hafiz2009ACO,
  title={A Catalog of Security-oriented Program Transformations},
  author={Munawar Hafiz and Paul Adamczyk and Ralph E. Johnson},
  year={2009}
}
Security requirements change, but the typical way of improving system security by patches is ad hoc and has not produced good results. Security improvements should be systematic, just as new features can be added to software systematically. It would be easier to improve the security of a system if we had a catalog of security-oriented program transformations that could be used to plan changes, to divide the work to make changes, and as a target of automation. This paper describes a catalog of… CONTINUE READING
6 Citations
29 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 29 references

OWASP Top 10 - The ten most critical web application security vulnerabilities

  • A. v. Stock, J. Williams, D. Wichers
  • 2007
1 Excerpt

Vulnerability type distributions is cve

  • S. Christey, R. Martin
  • 2007
1 Excerpt

Similar Papers

Loading similar papers…