Recommended Security Analysis Processes
Analyze the Attack Surface
Analyze the Effectiveness of Security Testing Using Path Coverage
Compare Complexity Metrics with Known Vulnerable Code
Control Flow Security Analysis Using Attack Maps
Path Coverage and Security Vulnerabilities
Combining McCabe IQ with Fuzz Testing - how leveraging static and dynamic path analysis will improve fuzz testing and software security.
Complexity Analysis of Hostile Applets - Forensics: Using Path-Oriented Metric Analysis to Unravel Hostile Applet
Algorithm Patterns, Signatures, Similarities, Authors and Derivations
Cyclomatic Path Analysis and Security Vulnerabilities - Learn how Cyclomatic Path Analysis detects more security vulnerabilities and errors in your critical applications.