The Software Assurance State-of-the-Art Resource
Unintentional and intentionally inserted vulnerabilities in software can provide adversaries with various avenues to reduce system effectiveness, render systems useless,โฆ
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
Unintentional and intentionally inserted vulnerabilities in software can provide adversaries with various avenues to reduce system effectiveness, render systems useless,โฆ
Software assurance (SwA) is the โlevel of confidence that software functions as intended and is free of vulnerabilities, either intentionallyโฆ
Measuring the software assurance of a product as it functions within a specific system context involves assembling carefully chosen metricsโฆ
Software and Security engineering as a discipline is getting increased attention across the Department of Defense (DoD) as a missionโฆ
The National Institute of Standards and Technology Software Assurance Metrics and Tool Evaluation team conducts research in static analysis toolsโฆ
One way to understand the strengths and limitations of software assurance tools is to use a corpus of programs withโฆ
Greetings, it is my honor to introduce the second of two special software assurance (SwA) editions of the Journal ofโฆ
This paper is a result of a cyber risk assessment undertaken with the goal of increasing the cyber awareness ofโฆ
Quanterion Solutions is thrilled to be competitively selected to operate the Department of Defense (DoD) Cyber Security and Information Systemsโฆ
The Air Force Research Laboratory (AFRL) is fortunate to have one of its subject matter experts (SMEs) working hand-in-hand withโฆ
On January 28th, 2011, Egypt disappeared from the global map. In a coordinated shutdown of all major Egyptian internet serviceโฆ
Once upon a time, a brave knight was entrusted with the guarding of a valuable treasure. An evil wizard hadโฆ