Software vulnerabilities are a well-known problem in current software projects. The situation becomes even more complicated, due to the ever-increasing complexity of the interconnections between both commercial and free open-source software (FOSS) projects. In this dissertation, we are aiming to facilitate the security assessment process in an industrial context. We start from the level of the own code of an individual software project, for which we propose a differential benchmarking approach for automatic assessment of static analysis security testing tools. We have demonstrated this approach, using 70 revisions of four major versions of Apache Tomcat with 62 distinct vulnerability fixes as a ground-truth set to test 7 tools. Since mo...
While many theoretical arguments against or in favor of open source and closed source software devel...
Programming has become central in the development of human activities while not being immune to def...
While many theoretical arguments against or in favor of open source and closed source software devel...
As the world continues to embrace a completely digital society in all aspects of life, the ever pres...
Modern software applications are developed with increasing reliance on open-source software packages...
Software security bugs | referred to as vulnerabilities | persist as an important and costly challen...
This is the author accepted manuscript. The final version is available from the publisher via the DO...
Software security and reliability are aspects of major concern for software development enterprises ...
Since software products are heavily used in today’s connected society, design and implementation of ...
Since software products are heavily used in today’s connected society, design and implementation of ...
2016 Summer.Includes bibliographical references.Most of the attacks on computer systems and networks...
With computer software pervading every aspect of our lives, vulnerabilities pose an active threat. M...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
Programming has become central in the development of human activities while not being immune to def...
Software vulnerabilities play a major role, as there are multiple risks associated, including loss a...
While many theoretical arguments against or in favor of open source and closed source software devel...
Programming has become central in the development of human activities while not being immune to def...
While many theoretical arguments against or in favor of open source and closed source software devel...
As the world continues to embrace a completely digital society in all aspects of life, the ever pres...
Modern software applications are developed with increasing reliance on open-source software packages...
Software security bugs | referred to as vulnerabilities | persist as an important and costly challen...
This is the author accepted manuscript. The final version is available from the publisher via the DO...
Software security and reliability are aspects of major concern for software development enterprises ...
Since software products are heavily used in today’s connected society, design and implementation of ...
Since software products are heavily used in today’s connected society, design and implementation of ...
2016 Summer.Includes bibliographical references.Most of the attacks on computer systems and networks...
With computer software pervading every aspect of our lives, vulnerabilities pose an active threat. M...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
Programming has become central in the development of human activities while not being immune to def...
Software vulnerabilities play a major role, as there are multiple risks associated, including loss a...
While many theoretical arguments against or in favor of open source and closed source software devel...
Programming has become central in the development of human activities while not being immune to def...
While many theoretical arguments against or in favor of open source and closed source software devel...