TDDC90 Software Security (6 ECTS)
HT2
Additional non-mandatory reading material
Additional reading: All papers listed below are non-mandatory and supposted to give you a deeper understanding of the topics.
Vulnerabilities, exploits and prevention (lecture 2 and 4)
Static analysis (lecture 3)
| G. Balakrishnan, T. Reps, D. Melski, T. Teitelbaum. WYSINWYX: What You See Is Not What You eXecute. In Verified Software: Theories, Tools, Experiments. Springer-Verlag, 2007. |
Security testing (lecture 5)
Secure programming and design (lecture 5)
| D. Wheeler. Secure Programmer: Minimizing Privileges |
Code inspections (lecture 6)
| 1028-2008 - IEEE Standard for Software Reviews and Audits (section 6 only) Available via the LiU-library website. |
Security requirements (lecture 7 and 8)
Secure development lifecycle processes (lecture 7, 8 and 9)
Risk and threat analysis (lecture 7 and 8)
| P. Torr. Demystifying the threat modeling process. IEEE Security & Privacy. 2005. |
Page responsible: Nahid Shahmehri
Last updated: 2012-10-31
