Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 10 results for the Author - fred long Secure Coding

Technical Report | November 2013 - Technical Report Mobile SCALe: Rules and Analysis for Secure Java and ... By Lujo Bauer (Carnegie Mellon University - Department of Electrical and Computer Engineering), Lori Flynn, Limin Jia (Carnegie Mellon University - Department of Electrical and Computer Engineering), Will Klieber, Fred Long, Dean F. Sutherland, David Svoboda

In this report, the authors describe Android secure coding rules, guidelines, and static analysis developed as part of the Mobile SCALe project.

Article | September 2013 - Article Java Coding Guidelines for Reliability By Fred Long (Aberystwyth University), Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda

In this sample chapter, the authors describe how to avoid obscure techniques and code that is difficult to understand and maintain when programming in Java.

Technical Report | May 2010 - Technical Report Java Concurrency Guidelines By Fred Long, Dhruv Mohindra, Robert C. Seacord, David Svoboda

In this report, the authors describe the CERT Oracle Secure Coding Standard for Java, which provides guidelines for secure coding in Java.

Book | September 2011 - Book The CERT Oracle Secure Coding Standard for Java By Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda

In this book, the authors provide the first comprehensive compilation of code-level requirements for building secure systems in Java.

Article | October 2011 - Article The CERT Oracle Secure Coding Standard for Java: Input ... By Fred Long (Aberystwyth University), David Svoboda, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland

In this sample chapter, the authors provide rules, assesses their risk, and provide noncompliant and compliant code and solutions to validate and sanitize the data.

Technical Report | May 2006 - Technical Report Specifications for Managed Strings By Hal Burch, Fred Long, Robert C. Seacord

This report has been superseded by Specifications for Managed Strings, Second Edition (CMU/SEI-2010-TR-018).

Technical Report | May 2010 - Technical Report Specifications for Managed Strings, Second Edition By Hal Burch, Fred Long, Raunak Rungta, Robert C. Seacord, David Svoboda

In this report, the authors describe a managed string library for the C programming language.

Technical Note | October 2005 - Technical Note Software Vulnerabilities in Java By Fred Long

In this report, Fred Long briefly describes potential software vulnerabilities in Java version 5.

Technical Note | September 2007 - Technical Note Ranged Integers for the C Programming Language By Jeff Gennari, Shaun Hedrick, Fred Long, Justin Pincar, Robert C. Seacord

In this 2007 report, the authors describe an extension to the C programming language to introduce the notion of ranged integers.

White Paper | August 2005 - White Paper Information Technology: Programming Languages, Their ... By Fred Long, Robert C. Seacord

In this paper, the authors present a standard specification for managed strings.