skip to main content
research-article

Approaches to Cyber-Resilience through Language System Design

Published:06 December 2019Publication History
Skip Abstract Section

Abstract

Software doesn't do what users wish due to defects, including security vulnerabilities Especially focus on vulnerabilities Defect categories for our purposes: Unintentional defects Security-related defects Non-security-related defects Intentional defects from malicious individual or subversion appearing to be from individual Need to help organization counter underhanded code Malicious organization: Hard to deal with Organization's goal & might not be considered defects Mechanisms to support independent review can help

Index Terms

(auto-classified)
  1. Approaches to Cyber-Resilience through Language System Design

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGAda Ada Letters
      ACM SIGAda Ada Letters  Volume 38, Issue 2
      December 2018
      106 pages
      ISSN:1094-3641
      DOI:10.1145/3375408
      • Editor:
      • Alok Srivastava
      Issue’s Table of Contents

      Copyright © 2019 Copyright is held by the owner/author(s)

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 December 2019

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!