Seven pernicious kingdoms: a taxonomy of software security errors

作者: K. Tsipenyuk , B. Chess , G. McGraw

DOI: 10.1109/MSP.2005.159

关键词:

摘要: Taxonomies can help software developers and security practitioners understand the common coding mistakes that affect security. The goal is to avoid making these more readily identify problems whenever possible. Because today are by large unaware of they (unknowingly) introduce into code, a taxonomy errors should provide real tangible benefit community. Although proposed here incomplete imperfect, it provides an important first step. It focuses on collecting explaining them in way makes sense programmers. This new made up two distinct kinds sets, which we're stealing from biology: phylum (a type error, such as illegal pointer value) kingdom collection phyla shares theme, input validation representation). Both kingdoms naturally emerge soup rules relevant enterprise software, it's for this reason likely be might lack certain errors. In some cases, easier effective talk about category than any particular attack. categories certainly related attacks, aren't same attack patterns.

参考文章(17)
John Viega, David LeBlanc, Michael Howard, 19 Deadly Sins of Software Security McGraw-Hill, Inc.. ,(2005)
Gary McGraw, Greg Hoglund, Exploiting Software: How to Break Code ,(2004)
Steven M. Bellovin, Aviel D. Rubin, William R. Cheswick, Firewalls and Internet Security: Repelling the Wily Hacker ,(2003)
Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi, A Taxonomy of Computer Program Security Flaws, with Examples Defense Technical Information Center. ,(1994) , 10.21236/ADA465587
David Wagner, Dawn Xiaodong Song, Xuqing Tian, Timing analysis of keystrokes and timing attacks on SSH usenix security symposium. pp. 25- 25 ,(2001)