The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2006 vol.4)
pp: 74-79
Michael Howard , Microsoft
ABSTRACT
No one really likes reviewing source code for security vulnerabilities, but it's a critical component of shipping secure software. Howard describes his approach to tackling the process. It won't identify all security vulnerabilities in your code, but it's effective for scanning large amounts of code quickly for common issues and reviewing risky code in greater depth.
INDEX TERMS
code review, security vulnerabilities, secure code
CITATION
Michael Howard, "A Process for Performing Security Code Reviews", IEEE Security & Privacy, vol.4, no. 4, pp. 74-79, July/August 2006, doi:10.1109/MSP.2006.84
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool