A TAXONOMY OF COMPUTER-PROGRAM SECURITY FLAWS

Citation
Ce. Landwehr et al., A TAXONOMY OF COMPUTER-PROGRAM SECURITY FLAWS, ACM computing surveys, 26(3), 1994, pp. 211-254
Citations number
30
Categorie Soggetti
Computer Sciences","Computer Science Theory & Methods
Journal title
ISSN journal
03600300
Volume
26
Issue
3
Year of publication
1994
Pages
211 - 254
Database
ISI
SICI code
0360-0300(1994)26:3<211:ATOCSF>2.0.ZU;2-6
Abstract
An organized record of actual flaws can be useful to computer system d esigners, programmers, analysts, administrators, and users. This surve y provides a taxonomy for computer program security flaws, with an App endix that documents 50 actual security flaws. These flaws have all be en described previously in the open literature, but in widely separate d places. For those new to the field of computer security, they provid e a good introduction to the characteristics of security flaws and how they can arise. Because these flaws were not randomly selected from a valid statistical sample of such flaws, we make no strong claims conc erning the likely distribution of actual security flaws within the tax onomy. However, this method of organizing security flaw data can help those who have custody of more representative samples to organize them and to focus their efforts to remove and, eventually, to prevent the introduction of security flaws.