• MOPS

  • Referenced in 23 articles [sw10117]
  • identify whether any state violating the desired security goal is reachable in the program ... verifying the absence of certain classes of vulnerabilities, that it is fully interprocedural, and that ... finding a wide range of security vulnerabilities in large programs efficiently...
  • Stranger

  • Referenced in 16 articles [sw09152]
  • finding and eliminating string-related security vulnerabilities in PHP applications. Stranger uses symbolic forward...
  • Trivium

  • Referenced in 79 articles [sw06150]
  • security, speed or flexibility. While simple designs are more likely to be vulnerable to simple...
  • KJS

  • Referenced in 7 articles [sw18992]
  • trivial programs and found a known security vulnerability...
  • Pixy

  • Referenced in 5 articles [sw25249]
  • static analysis tool for detecting web application vulnerabilities. The number and the importance ... time, the quantity and impact of security vulnerabilities in such applications have grown as well ... positive for each vulnerability) and therefore, low enough to permit effective security audits...
  • NVD

  • Referenced in 5 articles [sw15083]
  • repository of standards based vulnerability management data represented using the Security Content Automation Protocol ... SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases...
  • MulVAL

  • Referenced in 8 articles [sw17743]
  • Security Analyzer. To determine the security impact software vulnerabilities have on a particular network...
  • Julia Static Analyzer

  • Referenced in 3 articles [sw28173]
  • costs and eliminate risks related to security vulnerabilities and privacy leaks. The powerful analysis technology...
  • GDSL

  • Referenced in 3 articles [sw13118]
  • audit larger and larger programs for security vulnerabilities or safety violations. The basis for analyzing...
  • Splint

  • Referenced in 2 articles [sw18405]
  • statically checking C programs for security vulnerabilities and coding mistakes. With minimal effort, Splint...
  • ABASH

  • Referenced in 2 articles [sw19236]
  • program errors that may lead to security vulnerabilities. In experiments with 49 bash scripts taken...
  • Fortify

  • Referenced in 1 article [sw26890]
  • Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study. This ... solutions to remove five important software security vulnerabilities, which if left unattended could severely impact...
  • STORM-RM

  • Referenced in 3 articles [sw22128]
  • order to identify, categorise and handle security threats, vulnerabilities and risks of information and communication ... combining the analytic hierarchy process (AHP) with security management standards (ISO27001 and AS/NZS...
  • Saner

  • Referenced in 9 articles [sw37817]
  • developers with limited security skills, and, as a result, they contain vulnerabilities. Most of these...
  • CyGraph

  • Referenced in 1 article [sw22314]
  • describes CyGraph, a system for improving network security posture, maintaining situational awareness in the face ... mission impacts. It captures incremental attack vulnerability, security events, and mission dependencies within a network ... model of possible attack paths and critical vulnerabilities, and correlates events to known vulnerability paths...
  • eThor

  • Referenced in 1 article [sw41978]
  • Given their financial nature, security vulnerabilities may lead to catastrophic consequences and, even worse, they ... contract code itself, are immutable. An automated security analysis of these contracts is thus...
  • PolySpace

  • Referenced in 1 article [sw31196]
  • They include checkers for coding rules, security vulnerabilities, code metrics, and hundreds of additional classes...
  • BFF

  • Referenced in 1 article [sw15086]
  • researchers to efficiently discover and analyze security vulnerabilities found via fuzzing...
  • TryLinks

  • Referenced in 1 article [sw28846]
  • lead to costly errors or security vulnerabilities. In Links, programs combine all of the code...
  • SAFEWAPI

  • Referenced in 1 article [sw38000]
  • applications which may lead to severe security vulnerabilities. To help developers write safe JavaScript...