Application Security Code Analysis: A Step Towards Software Assurance. Rawat, S. & Saxena, A. IJICS, 3(1):86–110, September, 2009. Paper bibtex @article{rawat_application_2009,
title = {Application {Security} {Code} {Analysis}: {A} {Step} {Towards} {Software} {Assurance}},
volume = {3},
shorttitle = {Application {Security} {Code} {Analysis}},
url = {http://dx.doi.org/10.1504/IJICS.2009.026622},
number = {1},
journal = {IJICS},
author = {Rawat, Sanjay and Saxena, Ashutosh},
month = sep,
year = {2009},
keywords = {application code analysis, binary code instrumentation, code debugging, computer security, data flow, dynamic binary code, dynamic source code, information security, security vulnerability, software assurance, static binary code, static source code, taint analysis, type\_backup, type\_journal},
pages = {86--110},
}
Downloads: 0
{"_id":"jWgnnS6awTPqo9TAn","bibbaseid":"rawat-saxena-applicationsecuritycodeanalysisasteptowardssoftwareassurance-2009","author_short":["Rawat, S.","Saxena, A."],"bibdata":{"bibtype":"article","type":"article","title":"Application Security Code Analysis: A Step Towards Software Assurance","volume":"3","shorttitle":"Application Security Code Analysis","url":"http://dx.doi.org/10.1504/IJICS.2009.026622","number":"1","journal":"IJICS","author":[{"propositions":[],"lastnames":["Rawat"],"firstnames":["Sanjay"],"suffixes":[]},{"propositions":[],"lastnames":["Saxena"],"firstnames":["Ashutosh"],"suffixes":[]}],"month":"September","year":"2009","keywords":"application code analysis, binary code instrumentation, code debugging, computer security, data flow, dynamic binary code, dynamic source code, information security, security vulnerability, software assurance, static binary code, static source code, taint analysis, type_backup, type_journal","pages":"86–110","bibtex":"@article{rawat_application_2009,\n\ttitle = {Application {Security} {Code} {Analysis}: {A} {Step} {Towards} {Software} {Assurance}},\n\tvolume = {3},\n\tshorttitle = {Application {Security} {Code} {Analysis}},\n\turl = {http://dx.doi.org/10.1504/IJICS.2009.026622},\n\tnumber = {1},\n\tjournal = {IJICS},\n\tauthor = {Rawat, Sanjay and Saxena, Ashutosh},\n\tmonth = sep,\n\tyear = {2009},\n\tkeywords = {application code analysis, binary code instrumentation, code debugging, computer security, data flow, dynamic binary code, dynamic source code, information security, security vulnerability, software assurance, static binary code, static source code, taint analysis, type\\_backup, type\\_journal},\n\tpages = {86--110},\n}\n\n","author_short":["Rawat, S.","Saxena, A."],"key":"rawat_application_2009","id":"rawat_application_2009","bibbaseid":"rawat-saxena-applicationsecuritycodeanalysisasteptowardssoftwareassurance-2009","role":"author","urls":{"Paper":"http://dx.doi.org/10.1504/IJICS.2009.026622"},"keyword":["application code analysis","binary code instrumentation","code debugging","computer security","data flow","dynamic binary code","dynamic source code","information security","security vulnerability","software assurance","static binary code","static source code","taint analysis","type_backup","type_journal"],"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://download.vusec.net/papers/zotero.php?tag=&full=1&format=bibtex&sort=date","dataSources":["nxunfXsXuaAxDjLyX","hK7YCwvmf72pYkC5D","LY5xkJFgS2sBQ9umB","cEmMXPermWEFsgmMR"],"keywords":["application code analysis","binary code instrumentation","code debugging","computer security","data flow","dynamic binary code","dynamic source code","information security","security vulnerability","software assurance","static binary code","static source code","taint analysis","type_backup","type_journal"],"search_terms":["application","security","code","analysis","step","towards","software","assurance","rawat","saxena"],"title":"Application Security Code Analysis: A Step Towards Software Assurance","year":2009}