Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 14 results for the Author - carnegie mellon university) Secure Coding

Technical Report | November 2013 - Technical Report Mobile SCALe: Rules and Analysis for Secure Java and ... By Lujo Bauer (Carnegie Mellon University - Department of Electrical and Computer Engineering), Lori Flynn, Limin Jia (Carnegie Mellon University - Department of Electrical and Computer Engineering), Will Klieber, Fred Long, Dean F. Sutherland, David Svoboda

In this report, the authors describe Android secure coding rules, guidelines, and static analysis developed as part of the Mobile SCALe project.

White Paper | June 2011 - White Paper An Online Learning Approach to Information Systems Security ... By Norman Bier (Carnegie Mellon University), Marsha Lovett (Carnegie Mellon University), Robert C. Seacord

In this paper, the authors describe the development of a secure coding module that shows how to capture content, ensure learning, and scale to meet demand.

Presentation | October 2017 - Presentation Obsidian - A Safer Blockchain Programming Language By Eliezer Kanal, Michael Coblenz (Carnegie Mellon School of Computer Science)

Presentation on research by CMU and SEI to develop a novel programming language for secure blockchain software development

Presentation | June 2014 - Presentation Android Taint Flow Analysis for App Sets By Will Klieber, Lori Flynn, Amar S. Bhosale (Carnegie Mellon Heinz School), Limin Jia (Carnegie Mellon University - Department of Electrical and Computer Engineering), Lujo Bauer (Carnegie Mellon University - Department of Electrical and Computer Engineering)

In this presentation at the SOAP 2014 workshop, the authors describe their taint flow analysis for Android applications.

Technical Note | April 2010 - Technical Note As-If Infinitely Ranged Integer Model, Second Edition By Roger Dannenberg (School of Computer Science - Carnegie Mellon University), Will Dormann, David Keaton, Thomas Plum (Plum Hall - Inc.), Robert C. Seacord, David Svoboda, Alex Volkovitsky, Timothy Wilson

In this report, the authors present the as-if infinitely ranged (AIR) integer model, a mechanism for eliminating integral exceptional conditions.

Presentation | May 2015 - Presentation Empirical Evaluation of API Usability and Security By Samuel M. Weber, Brad Myers, Forrest Shull, Robert C. Seacord, Michael Coblenz (Carnegie Mellon School of Computer Science), Joshua Sunshine (Institute for Software Research), David Keaton

In this presentation, the authors describe their work to develop and test API design principles.

Presentation | June 2015 - Presentation Using DidFail to Analyze Flow of Sensitive Information in Sets ... By William Klieber, Lori Flynn, Amar S. Bhosale (Carnegie Mellon Heinz School), Limin Jia (Carnegie Mellon University - Department of Electrical and Computer Engineering), Lujo Bauer (Carnegie Mellon University - Department of Electrical and Computer Engineering)

In this presentation, the authors describe how to use DidFail, a tool that detects potential leaks of sensitive information in Android apps.

Presentation | November 2010 - Presentation As-If Infinitely Ranged Integer Model By Roger Dannenberg (School of Computer Science - Carnegie Mellon University), Thomas Plum (Plum Hall - Inc.), Will Dormann, David Keaton, Robert C. Seacord, David Svoboda, Alex Volkovitsky, Timothy Wilson

This ISSRE 2010 paper describes the AIR Integer model for eliminating vulnerabilities resulting from integer overflow, truncation, and unanticipated wrapping.

Conference Paper | May 2014 - Conference Paper Android Taint Flow Analysis for App Sets By Will Klieber, Lori Flynn, Amar S. Bhosale (Carnegie Mellon Heinz School), Limin Jia (Carnegie Mellon University - Department of Electrical and Computer Engineering), Lujo Bauer (Carnegie Mellon University - Department of Electrical and Computer Engineering)

This paper describes a new static taint flow analysis that precisely tracks both inter-component and intra-component data flow in a set of Android applications.

Poster | May 2015 - Poster TWC: Small: Empirical Evaluation of the Usability and Security ... By Brad Myers, Samuel M. Weber, Robert C. Seacord, Michael Coblenz (Carnegie Mellon School of Computer Science), David Keaton, Forrest Shull, Joshua Sunshine (Institute for Software Research), Robert Schiela

In this poster, the authors analyze the usability of application programming interface design.