[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
discussion

Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors

Published: 01 November 2005 Publication History

Abstract

Taxonomies can help software developers and security practitioners understand the common coding mistakes that affect security. The goal is to help developers avoid making these mistakes and more readily identify security problems whenever possible. Because developers today are by and large unaware of the security problems they can (unknowingly) introduce into code, a taxonomy of coding errors should provide a real tangible benefit to the software security community.

References

[1]
G. Hoglund and G. McGraw, Exploiting Software: How to Break Code, Addison-Wesley, 2004.
[2]
G. Miller, The Magic Number Seven, Plus or Minus Two,The Psychological Rev ., vol. 63, 1956, pp. 81–97;
[3]
M. Howard, D. LeBlanc, and J. Viega, 19 Deadly Sins of Software Security, McGraw-Hill, 2005.
[4]
K. Tsipenyuk, B. Chess, and G. McGraw, "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors," to be published in Proc. NIST Workshop on Software Security Assurance Tools, Techniques, and Metrics (SSATTM), US Nat'l Inst. Standards and Technology, 2005.

Cited By

View all
  • (2021)Why Don't Developers Detect Improper Input Validation?'Proceedings of the 43rd International Conference on Software Engineering10.1109/ICSE43902.2021.00054(499-511)Online publication date: 22-May-2021
  • (2020)Graft: Static Analysis of Java Bytecode with Graph DatabasesConference of the South African Institute of Computer Scientists and Information Technologists 202010.1145/3410886.3410901(217-226)Online publication date: 14-Sep-2020
  • (2018)API blindspotsProceedings of the Fourteenth USENIX Conference on Usable Privacy and Security10.5555/3291228.3291253(315-328)Online publication date: 12-Aug-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 3, Issue 6
November 2005
93 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 November 2005

Author Tags

  1. errors
  2. kingdom
  3. phyla
  4. taxonomy

Qualifiers

  • Discussion

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Why Don't Developers Detect Improper Input Validation?'Proceedings of the 43rd International Conference on Software Engineering10.1109/ICSE43902.2021.00054(499-511)Online publication date: 22-May-2021
  • (2020)Graft: Static Analysis of Java Bytecode with Graph DatabasesConference of the South African Institute of Computer Scientists and Information Technologists 202010.1145/3410886.3410901(217-226)Online publication date: 14-Sep-2020
  • (2018)API blindspotsProceedings of the Fourteenth USENIX Conference on Usable Privacy and Security10.5555/3291228.3291253(315-328)Online publication date: 12-Aug-2018
  • (2018)Automatic Software RepairACM Computing Surveys10.1145/310590651:1(1-24)Online publication date: 23-Jan-2018
  • (2017)Attack surface-based security metric framework for service selection and compositionInternational Journal of Autonomous and Adaptive Communications Systems10.1504/IJAACS.2017.08274110:1(88-113)Online publication date: 1-Jan-2017
  • (2016)Security Injections@TowsonACM Transactions on Computing Education10.1145/289744116:4(1-20)Online publication date: 9-Jun-2016
  • (2016)Security expert recommender in software engineeringProceedings of the 38th International Conference on Software Engineering Companion10.1145/2889160.2892648(719-721)Online publication date: 14-May-2016
  • (2016)Securing web applications from injection and logic vulnerabilitiesInformation and Software Technology10.1016/j.infsof.2016.02.00574:C(160-180)Online publication date: 1-Jun-2016
  • (2016)Towards Vulnerability Discovery Using Staged Program AnalysisProceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 972110.1007/978-3-319-40667-1_5(78-97)Online publication date: 7-Jul-2016
  • (2016)Information Security in Software Engineering, Analysis of Developers Communications About Security in Social Q&A WebsiteProceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics - Volume 965010.1007/978-3-319-31863-9_14(193-202)Online publication date: 19-Apr-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media