Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Andrew Meneely"'
Publikováno v:
ACM Transactions on Software Engineering and Methodology. 31:1-25
Penetration testing is a key practice toward engineering secure software. Malicious actors have many tactics at their disposal, and software engineers need to know what tactics attackers will prioritize in the first few hours of an attack. Projects l
Autor:
Andrew Meneely, Benjamin S. Meyers
Publikováno v:
ANT/EDI40
The daily activities of cybersecurity experts and software engineers—code reviews, issue tracking, vulnerability reporting—are constantly contributing to a massive wealth of security-specific natural language. In the case of vulnerabilities, unde
Publikováno v:
ESEM
(Background) Software vulnerabilities pose a serious threat to the security of computer systems. Hence, there is a constant race for defenders to find and patch them before attackers are able to exploit them. Measuring different aspects of this proce
Autor:
Mahran Al-Zyoud, Christopher Theisen, Nuthan Munaiah, Laurie Williams, Andrew Meneely, Jeffrey C. Carver
Publikováno v:
Information and Software Technology. 104:94-103
Context Michael Howard conceptualized the attack surface of a software system as a metaphor for risk assessment during the development and maintenance of software. While the phrase attack surface is used in a variety of contexts in cybersecurity, pro
Publikováno v:
2012 ASEE Annual Conference & Exposition Proceedings.
Publikováno v:
ESEM
Background: Inculcating an attacker mindset (i.e. learning to think like an attacker) is an essential skill for engineers and administrators to improve the overall security of software. Describing the approach that adversaries use to discover and exp
Autor:
Nuthan Munaiah, Andrew Meneely
Publikováno v:
RCoSE-DDrEE@ICSE
Software metrics help developers discover and fix mistakes. However, despite promising empirical evidence, vulnerability discovery metrics are seldom relied upon in practice. In prior research, the effectiveness of these metrics has typically been ex
Publikováno v:
CHASE@ICSE
Experts suggest that engineering secure software requires a defensive mindset to be ingrained in developer culture, which could be reflected in conversation. But what does a conversation about software security in a real project look like? Linguists
Publikováno v:
Empirical Software Engineering. 22:1305-1347
As developers face an ever-increasing pressure to engineer secure software, researchers are building an understanding of security-sensitive bugs (i.e. vulnerabilities). Research into mining software repositories has greatly increased our understandin
Autor:
Cecilia Ovesdotter Alm, Benjamin S. Meyers, Emily Prud'hommeaux, Pradeep K. Murukannaiah, Andrew Meneely, Nuthan Munaiah, Josephine Wolff
Publikováno v:
ACL (2)
Software developers and testers have long struggled with how to elicit proactive responses from their coworkers when reviewing code for security vulnerabilities and errors. For a code review to be successful, it must not only identify potential probl