The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2006 vol. 4)
ISSN: 1540-7993
pp: 74-79
Michael Howard , Microsoft
No one really likes reviewing source code for security vulnerabilities, but it's a critical component of shipping secure software. Howard describes his approach to tackling the process. It won't identify all security vulnerabilities in your code, but it's effective for scanning large amounts of code quickly for common issues and reviewing risky code in greater depth.
code review, security vulnerabilities, secure code

M. Howard, "A Process for Performing Security Code Reviews," in IEEE Security & Privacy, vol. 4, no. , pp. 74-79, 2006.
92 ms
(Ver 3.3 (11022016))