Recommended Security Analysis Processes
Analyze the Attack Surface
Analyze the Effectiveness of Security Testing Using Path Coverage
Compare Complexity Metrics with Known Vulnerable Code
Webinar:
|
|
Video Library:
Control Flow Security Analysis Using Attack Maps
Path Coverage and Security Vulnerabilities
Document Library:
Combining McCabe IQ with Fuzz Testing - how leveraging static and dynamic path analysis will improve fuzz testing and software security.
Complexity Analysis of Hostile Applets - Forensics: Using Path-Oriented Metric Analysis to Unravel Hostile Applet
Algorithm Patterns, Signatures, Similarities, Authors and Derivations
Cyclomatic Path Analysis and Security Vulnerabilities - Learn how Cyclomatic Path Analysis detects more security vulnerabilities and errors in your critical applications.
More Papers |