Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 32 results for the Author - david svoboda Secure Coding

Technical Note | April 2012 - Technical Note Source Code Analysis Laboratory (SCALe) By Robert C. Seacord, Will Dormann, James McCurley, Philip Miller, Robert W. Stoddard, David Svoboda, Jefferson Welch

In this report, the authors describe the CERT Program's Source Code Analysis Laboratory (SCALe), a conformance test against secure coding standards.

Technical Note | June 2014 - Technical Note Improving the Automated Detection and Analysis of Secure ... By Daniel Plakosh, Robert C. Seacord, Robert W. Stoddard, David Svoboda, David Zubrow

This technical note describes the accuracy analysis of the Source Code Analysis Laboratory (SCALe) tools and the characteristics of flagged coding violations.

Technical Report | December 2010 - Technical Report Source Code Analysis Laboratory (SCALe) for Energy ... By Robert C. Seacord, Will Dormann, James McCurley, Philip Miller, Robert W. Stoddard, David Svoboda, Jefferson Welch

In this report, the authors describe the Source Code Analysis Laboratory (SCALe), which tests software for conformance to CERT secure coding standards.

Technical Report | June 2008 - Technical Report Evaluation of CERT Secure Coding Rules through Integration ... By Stephen Dewhurst, Chad Dougherty, Yurie Ito, David Keaton, Dan Saks, Robert C. Seacord, David Svoboda, Chris Taschner, Kazuya Togashi (JPCERT/CC)

In this report, the authors describe a study to evaluate CERT Secure Coding Standards and source code analysis tools in commercial software projects.

Technical Report | November 2013 - Technical Report Mobile SCALe: Rules and Analysis for Secure Java and ... By Lujo Bauer (Carnegie Mellon University - Department of Electrical and Computer Engineering), Lori Flynn, Limin Jia (Carnegie Mellon University - Department of Electrical and Computer Engineering), Will Klieber, Fred Long, Dean F. Sutherland, David Svoboda

In this report, the authors describe Android secure coding rules, guidelines, and static analysis developed as part of the Mobile SCALe project.

Article | September 2013 - Article Java Coding Guidelines for Reliability By Fred Long (Aberystwyth University), Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda

In this sample chapter, the authors describe how to avoid obscure techniques and code that is difficult to understand and maintain when programming in Java.

Presentation | September 2016 - Presentation Inside the CERT Oracle Secure Coding Standard for Java By David Svoboda

In this session, the authors of the CERT Oracle Secure Coding Standard for Java describe how it can be used to secure your Java projects.

Presentation | September 2016 - Presentation The Java Security Architecture: How? and Why? By David Svoboda

In this tutorial, David Svoboda describes the design of Java's security architecture and its pros and cons.

Technical Report | May 2010 - Technical Report Java Concurrency Guidelines By Fred Long, Dhruv Mohindra, Robert C. Seacord, David Svoboda

In this report, the authors describe the CERT Oracle Secure Coding Standard for Java, which provides guidelines for secure coding in Java.

Book | September 2011 - Book The CERT Oracle Secure Coding Standard for Java By Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda

In this book, the authors provide the first comprehensive compilation of code-level requirements for building secure systems in Java.