Abstract
Given the large focus on software vulnerabilities in the current market place, ISO/IEC JTC 1/SC 22/WG 23 has developed a Technical Report (TR) on Vulnerabilities [1]. This TR contains vulnerabilities that may be applicable to a programming language or application. This article provides a synopsis of these vulnerabilities with respect to the Ada programming language [2].
- ISO/IEC JTC 1/SC 22 N 4522, ISO/IEC TR 24772, Information Technology --- Programming Languages -- Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use, 7 November 2009.Google Scholar
- Taft, S. Tucker, Duff, R. A., Brukardt, R. L., Ploedereder, E., Leroy, P, Ada Reference Manual, LNCS 4348, Springer, Heidelberg, 2006.Google Scholar
- NIST Special Publication 268, "Source Code Security Analysis Tool Functional Specification Version 1.0," May 2007.Google Scholar
- Ada User Journal, Volume 22, 2009.Google Scholar
Index Terms
Ada and the software vulnerabilities project
Recommendations
Software vulnerabilities precluded by spark
SIGAda '11: Proceedings of the 2011 ACM annual international conference on Special interest group on the ada programming languageSoftware vulnerabilities are defined as a property of a system's security requirements, design, implementation, or operation that could be accidentally triggered or intentionally exploited and result in a security failure [1]. Many organizations ...
Software vulnerabilities precluded by spark
Software vulnerabilities are defined as a property of a system's security requirements, design, implementation, or operation that could be accidentally triggered or intentionally exploited and result in a security failure [1]. Many organizations ...
Mining trends and patterns of software vulnerabilities
We mine software vulnerabilities to facilitate vendors in making decisions about future vulnerabilities in software applications.Results show that no significant difference exists in trend of vulnerabilities.Sequential patterns of vulnerability events ...






Comments