SlideShare a Scribd company logo
1 of 72
Agriculture and Food
Energy
Transportation
Chemical Industry
Postal and Shipping
Water
Public Health
Telecommunications
Banking and Finance
Key Assets
cve.mitre.org
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n
ITU-T X.1520
TELECOMMUNICATION
STANDARDIZATION SECTOR
OF ITU
(01/2014)
SERIES X: DATA NETWORKS, OPEN SYSTEM
COMMUNICATIONS AND SECURITY
Cybersecurity information exchange – Vulnerability/state
exchange
Common vulnerabilities and exposures
Recommendation ITU-T X.1520
x
U n i ó n I n t e r n a c i o n a l d e T e l e c o m u n i c a c i o n e s
UIT-T X.1520
SECTOR DE NORMALIZACIÓN
DE LAS TELECOMUNICACIONES
DE LA UIT
(04/2011)
SERIE X: REDES DE DATOS, COMUNICACIONES
DE SISTEMAS ABIERTOS Y SEGURIDAD
Intercambio de información de ciberseguridad –
Intercambio de estados/vulnerabilidad
Vulnerabilidades y exposiciones comunes
Recomendación UIT-T X.1520
U n i o n i n t e r n a t i o n a l e d e s t é l é c o m m u n i c a t i o n s
UIT-T X.1520
SECTEUR DE LA NORMALISATION
DES TÉLÉCOMMUNICATIONS
DE L'UIT
(04/2011)
SÉRIE X: RÉSEAUX DE DONNÉES, COMMUNICATION
ENTRE SYSTÈMES OUVERTS ET SÉCURITÉ
Echange d'informations sur la cybersécurité – Echange
concernant les vulnérabilités/les états
Vulnérabilités et expositions courantes
Recommandation UIT-T X.1520
ITU-T X.1520
(04/2011)
X
–
ITU-T X.1520
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n
ITU-T X.1521
TELECOMMUNICATION
STANDARDIZATION SECTOR
OF ITU
(03/2016)
SERIES X: DATA NETWORKS, OPEN SYSTEM
COMMUNICATIONS AND SECURITY
Cybersecurity information exchange Vulnerability/state
exchange
Common vulnerability scoring system 3.0
Recommendation ITU-T X.1521
X.1520 ITU-T
(2011/04)
X:
/
(CVE)
ITU-T X.1520
TM
CAPECTM
TMSS
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n
ITU-T X.1525
TELECOMMUNICATION
STANDARDIZATION SECTOR
OF ITU
(04/2015)
SERIES X: DATA NETWORKS, OPEN SYSTEM
COMMUNICATIONS AND SECURITY
Cybersecurity information exchange Vulnerability/state
exchange
Common weakness scoring system
Recommendation ITU-T X.1525
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n
ITU-T X.1524
TELECOMMUNICATION
STANDARDIZATION SECTOR
OF ITU
(03/2012)
SERIES X: DATA NETWORKS, OPEN SYSTEM
COMMUNICATIONS AND SECURITY
Cybersecurity information exchange – Vulnerability/state
exchange
Common weakness enumeration
Recommendation ITU-T X.1524
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n
ITU-T X.1544
TELECOMMUNICATION
STANDARDIZATION SECTOR
OF ITU
(04/2013)
SERIES X: DATA NETWORKS, OPEN SYSTEM
COMMUNICATIONS AND SECURITY
Cybersecurity information exchange –
Event/incident/heuristics exchange
Common attack pattern enumeration and
classification
Recommendation ITU-T X.1544
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n
ITU-T X.1525
TELECOMMUNICATION
STANDARDIZATION SECTOR
OF ITU
(04/2015)
SERIES X: DATA NETWORKS, OPEN SYSTEM
COMMUNICATIONS AND SECURITY
Cybersecurity information exchange Vulnerability/state
exchange
Common weakness scoring system
Recommendation ITU-T X.1525
A
__________________________________________________________________________________________________
Volume 2 A Source of News for All Things Secure Coding 10/20/15
CWSS for Top 25 Ground System CWE’s
CWE ID CWE Title CWSS
23 Relative Path Traversal 23.63885
88 Argument Injection or Modification 12.369
20 Improper Input Validation 12.121
119
Improper Restriction of Operations within the Bounds of a
Memory Buffer
11.0295
73 External Control of File Name or Path 10.2465
835 Loop with Unreachable Exit Condition ('Infinite Loop') 10.135125
772 Missing Release of Resource after Effective Lifetime 10.0035
833 Deadlock 9.804375
764 Multiple Locks of a Critical Resource 9.804375
421 Race Condition During Access to Alternate Channel 9.696375
22
Improper Limitation of a Pathname to a Restricted
Directory ('Path Traversal')
9.57825
732 Incorrect Permission Assignment for Critical Resource 9.57825
77
Improper Neutralization of Special Elements used in a
Command ('Command Injection')
9.3555
251 Often Misused: String Management 9.288
788 Access of Memory Location After End of Buffer 9.288
787 Out-of-bounds Write 9.288
134 Uncontrolled Format String 9.288
131 Incorrect Calculation of Buffer Size 9.288
805 Buffer Access with Incorrect Length Value 9.288
192 Integer Coercion Error 8.68725
197 Numeric Truncation Error 8.68725
681 Incorrect Conversion between Numeric Types 8.68725
497
Exposure of System Data to an Unauthorized Control
Sphere
8.68725
290 Authentication Bypass by Spoofing 8.68725
367 Time-of-check Time-of-use (TOCTOU) Race Condition 8.5201875
CWSS for Top 25 Flight System CWE’s
CWE ID CWE Title CWSS
120
Buffer Copy without Checking Size of Input (‘Classic Buffer
Overflow’)
10.64475
772 Missing Release of Resource after Effective Lifetime 10.0035
134 Uncontrolled Format String 9.828
665 Improper Initialization 9.828
119
Improper Restriction of Operations within the Bounds of a
Memory Buffer
9.828
251 Often Misused: String Management 9.828
131 Incorrect Calculation of Buffer Size 9.828
805 Buffer Access with Incorrect Length Value 9.828
788 Access of Memory Location After End of Buffer 9.828
787 Out-of-bounds Write 9.828
764 Multiple Locks of a Critical Resource 9.804375
833 Deadlock 9.804375
20 Improper Input Validation 9.6985
835 Loop with Unreachable Exit Condition (‘Infinite Loop’) 9.244125
122 Heap-based Buffer Overflow 8.964
121 Stack-based Buffer Overflow 8.964
190 Integer Overflow or Wraparound 8.964
129 Improper Validation of Array Index 8.964
170 Improper Null Termination 8.802
197 Numeric Truncation Error 8.68725
457 Use of Uninitialized Variable 8.68725
416 Use After Free 8.68725
681 Incorrect Conversion between Numeric Types 8.68725
192 Integer Coercion Error 8.68725
468 Incorrect Pointer Scaling 8.68725
CISQ Specifications for
Automated Quality
Characteristic Measures
Reliability
Performance Efficiency
Security
Maintainability
Reality is more complex and more
changing…
What artifacts can be examined to predict Quality Gaps?
What artifacts can be examined to predict Quality Gaps?
SW artifact SW artifact SW artifact SW artifact SW artifact
CONOPS
Requirements Architecture Design
Environment
Use of SW
Process
Code
Binary
Running Binary
OperateCodeArchitecture DesignConcept
Date: August 2010
Argumentation Metamodel (ARM)
FTF - Beta 1
OMG Document Number: ptc/2010-08-36
Standard document URL: http://www.omg.org/spec/ARM
Associated Schema Files:
sysa/2010-03-16 -- http://www.omg.org/spec/ARM/20100301
sysa/2010-03-17 -- http://www.omg.org/spec/ARM/20100302
This OMG document replaces the submission document (sysa/2010-03-05, Alpha). It is an OMG
Adopted Beta Specification and is currently in the finalization phase. Comments on the content of
this document are welcome, and should be directed to issues@omg.org by February 1, 2011.
You may view the pending issues for this specification from the OMG revision issues web page
http://www.omg.org/issues/.
The FTF Recommendation and Report for this specification will be published on July 1, 2011. If you
are reading this after that date, please download the available specification from the OMG
Specifications Catalog.
Date: August 2010
Software Assurance Evidence Metamodel
(SAEM)
FTF - Beta 1
OMG Document Number: ptc/2010-08-37
Standard document URL: http://www.omg.org/spec/SAEM
Associated Schema Files:
sysa/2010-02-02 -- http://www.omg.org/spec/SAEM/20100201
sysa/2010-02-03 -- http://www.omg.org/spec/SAEM/20100202
sysa/2010-02-04 -- http://www.omg.org/spec/SAEM/20100203
sysa/2010-02-05 -- http://www.omg.org/spec/SAEM/20100204
This OMG document replaces the submission document (sysa/2010-03-05, Alpha). It is an OMG
Adopted Beta Specification and is currently in the finalization phase. Comments on the content of
this document are welcome, and should be directed to issues@omg.org by February 1, 2011.
You may view the pending issues for this specification from the OMG revision issues web page
http://www.omg.org/issues/.
The FTF Recommendation and Report for this specification will be published on July 1, 2011. If you
are reading this after that date, please download the available specification from the OMG
Specifications Catalog.
ARMetamodel
SBVR
Semantic
Business
Vocabulary
& Rules
KDM Knowledge Discovery Metamodel
SAEM Software Assurance Evidence
Metamodel
SACM
Structured Assurance
Case Metamodel
Date: April 2012
Structured Assurance Case Metamodel
(SACM)
FTF - Convenience Document 1
OMG Document Number: ptc/2012-04-04
Standard document URL: http://www.omg.org/spec/SACM
Associated Schema Files:
sysa/2010-03-16 -- http://www.omg.org/spec/ARM/20100301
sysa/2010-03-17 -- http://www.omg.org/spec/ARM/20100302
sysa/2010-02-02 -- http://www.omg.org/spec/SAEM/20100201
sysa/2010-02-03 -- http://www.omg.org/spec/SAEM/20100202
sysa/2010-02-04 -- http://www.omg.org/spec/SAEM/20100203
sysa/2010-02-05 -- http://www.omg.org/spec/SAEM/20100204
This OMG document replaces the individual adopted specifications (ptc/2010-08-36, ARM, Beta 1
and ptc/2010-08-37, SAEM, Beta 1). It is an OMG Adopted Beta Specification and is currently in the
finalization phase. Comments on the content of this document are welcome, and should be directed
to issues@omg.org by February 1, 2011.
You may view the pending issues for this specification from the OMG revision issues web page
http://www.omg.org/issues/.
The FTF Recommendation and Report for this specification will be published on July 24, 2012. If you
are reading this after that date, please download the available specification from the OMG
Specifications Catalog.
Evidence of Trustworthiness as Assurance Cases
HIS 2017 Robert Martin- assured software  a journey and discussion-final
HIS 2017 Robert Martin- assured software  a journey and discussion-final
HIS 2017 Robert Martin- assured software  a journey and discussion-final
HIS 2017 Robert Martin- assured software  a journey and discussion-final
HIS 2017 Robert Martin- assured software  a journey and discussion-final
HIS 2017 Robert Martin- assured software  a journey and discussion-final
HIS 2017 Robert Martin- assured software  a journey and discussion-final

More Related Content

Similar to HIS 2017 Robert Martin- assured software a journey and discussion-final

Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
How Internet Works
How Internet WorksHow Internet Works
How Internet WorksKae Hsu
 
Amol scadaowasp
Amol scadaowaspAmol scadaowasp
Amol scadaowaspdrewz lin
 
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4Computer Networking network layer chapter 4
Computer Networking network layer chapter 4RoopaRathod2
 
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptChapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptMaiTran87348
 
ACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems InterconnectACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems InterconnectSleek International
 
huawei-s5710-28c-ei-brochure-datasheet.pdf
huawei-s5710-28c-ei-brochure-datasheet.pdfhuawei-s5710-28c-ei-brochure-datasheet.pdf
huawei-s5710-28c-ei-brochure-datasheet.pdfHi-Network.com
 
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...SBWebinars
 
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...Brandon DeVault
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessOliver Pfaff
 
TELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptxTELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptxWangRoof
 
huawei-s5700-28p-li-bat-brochure-datasheet.pdf
huawei-s5700-28p-li-bat-brochure-datasheet.pdfhuawei-s5700-28p-li-bat-brochure-datasheet.pdf
huawei-s5700-28p-li-bat-brochure-datasheet.pdfHi-Network.com
 
Virtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadVirtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadBrain IoT Project
 
OPAL-RT Webinar - Challenges in Protection Relay Testing
OPAL-RT Webinar - Challenges in Protection Relay TestingOPAL-RT Webinar - Challenges in Protection Relay Testing
OPAL-RT Webinar - Challenges in Protection Relay TestingOPAL-RT TECHNOLOGIES
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 
PERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUES
PERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUESPERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUES
PERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUESIRJET Journal
 

Similar to HIS 2017 Robert Martin- assured software a journey and discussion-final (20)

Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Amol scadaowasp
Amol scadaowaspAmol scadaowasp
Amol scadaowasp
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4Computer Networking network layer chapter 4
Computer Networking network layer chapter 4
 
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptChapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.ppt
 
ACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems InterconnectACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems Interconnect
 
ACIT Mumbai - OSI Model
ACIT Mumbai - OSI ModelACIT Mumbai - OSI Model
ACIT Mumbai - OSI Model
 
Open Programmability
Open ProgrammabilityOpen Programmability
Open Programmability
 
huawei-s5710-28c-ei-brochure-datasheet.pdf
huawei-s5710-28c-ei-brochure-datasheet.pdfhuawei-s5710-28c-ei-brochure-datasheet.pdf
huawei-s5710-28c-ei-brochure-datasheet.pdf
 
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
 
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusiness
 
TELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptxTELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptx
 
huawei-s5700-28p-li-bat-brochure-datasheet.pdf
huawei-s5700-28p-li-bat-brochure-datasheet.pdfhuawei-s5700-28p-li-bat-brochure-datasheet.pdf
huawei-s5700-28p-li-bat-brochure-datasheet.pdf
 
Virtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges AheadVirtual Twins: Modeling Trends and Challenges Ahead
Virtual Twins: Modeling Trends and Challenges Ahead
 
OPAL-RT Webinar - Challenges in Protection Relay Testing
OPAL-RT Webinar - Challenges in Protection Relay TestingOPAL-RT Webinar - Challenges in Protection Relay Testing
OPAL-RT Webinar - Challenges in Protection Relay Testing
 
Hack the 802.11 MAC
Hack the 802.11 MACHack the 802.11 MAC
Hack the 802.11 MAC
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
PERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUES
PERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUESPERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUES
PERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUES
 

More from jamieayre

HIS 2017 Mark Batty-Industrial concurrency specification for C/C++
HIS 2017 Mark Batty-Industrial concurrency specification for C/C++HIS 2017 Mark Batty-Industrial concurrency specification for C/C++
HIS 2017 Mark Batty-Industrial concurrency specification for C/C++jamieayre
 
HIS 2017 David Oswald- Your car is not a safe box - breaking automotive keyle...
HIS 2017 David Oswald- Your car is not a safe box - breaking automotive keyle...HIS 2017 David Oswald- Your car is not a safe box - breaking automotive keyle...
HIS 2017 David Oswald- Your car is not a safe box - breaking automotive keyle...jamieayre
 
HIS 2017 Paul Sherwood- towards trustable software
HIS 2017 Paul Sherwood- towards trustable software HIS 2017 Paul Sherwood- towards trustable software
HIS 2017 Paul Sherwood- towards trustable software jamieayre
 
HIS 2017 Marie Moe- Unpatchable-Living with a Vulnerable Implanted Device
HIS 2017 Marie Moe- Unpatchable-Living with a Vulnerable Implanted DeviceHIS 2017 Marie Moe- Unpatchable-Living with a Vulnerable Implanted Device
HIS 2017 Marie Moe- Unpatchable-Living with a Vulnerable Implanted Devicejamieayre
 
HIS 2017 Jonathan Pallant- Delivering quality, time after time
HIS 2017 Jonathan Pallant-  Delivering quality, time after timeHIS 2017 Jonathan Pallant-  Delivering quality, time after time
HIS 2017 Jonathan Pallant- Delivering quality, time after timejamieayre
 
HIS 2017 Peter Ladkin- Rigorous-Assurance Points in Software Development
HIS 2017 Peter Ladkin-  Rigorous-Assurance Points in Software DevelopmentHIS 2017 Peter Ladkin-  Rigorous-Assurance Points in Software Development
HIS 2017 Peter Ladkin- Rigorous-Assurance Points in Software Developmentjamieayre
 
HIS 2017 Dewi Daniels- bridging the gap between manned and unmanned
HIS 2017 Dewi Daniels- bridging the gap between manned and unmannedHIS 2017 Dewi Daniels- bridging the gap between manned and unmanned
HIS 2017 Dewi Daniels- bridging the gap between manned and unmannedjamieayre
 
HIS 2017 Roderick chapman- Secure Updates for Embedded Systems
HIS 2017 Roderick chapman- Secure Updates for Embedded SystemsHIS 2017 Roderick chapman- Secure Updates for Embedded Systems
HIS 2017 Roderick chapman- Secure Updates for Embedded Systemsjamieayre
 
AdaCore Paris Tech Day 2016: Jose Ruiz - QGen Tech Update
AdaCore Paris Tech Day 2016: Jose Ruiz - QGen Tech UpdateAdaCore Paris Tech Day 2016: Jose Ruiz - QGen Tech Update
AdaCore Paris Tech Day 2016: Jose Ruiz - QGen Tech Updatejamieayre
 
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...jamieayre
 
AdaCore Paris Tech Day 2016: Eric Perlade - Verification Solutions
AdaCore Paris Tech Day 2016: Eric Perlade - Verification SolutionsAdaCore Paris Tech Day 2016: Eric Perlade - Verification Solutions
AdaCore Paris Tech Day 2016: Eric Perlade - Verification Solutionsjamieayre
 
AdaCore Paris Tech Day 2016: Elie Richa - Integrated Unit Testing for a Trust...
AdaCore Paris Tech Day 2016: Elie Richa - Integrated Unit Testing for a Trust...AdaCore Paris Tech Day 2016: Elie Richa - Integrated Unit Testing for a Trust...
AdaCore Paris Tech Day 2016: Elie Richa - Integrated Unit Testing for a Trust...jamieayre
 
AdaCore Paris Tech Day 2016: Pierre-Marie Rodat - Libadalang, New Generation ...
AdaCore Paris Tech Day 2016: Pierre-Marie Rodat - Libadalang, New Generation ...AdaCore Paris Tech Day 2016: Pierre-Marie Rodat - Libadalang, New Generation ...
AdaCore Paris Tech Day 2016: Pierre-Marie Rodat - Libadalang, New Generation ...jamieayre
 
AdaCore Paris Tech Day 2016: Cyrille Comar - Looking Ahead
AdaCore Paris Tech Day 2016: Cyrille Comar - Looking AheadAdaCore Paris Tech Day 2016: Cyrille Comar - Looking Ahead
AdaCore Paris Tech Day 2016: Cyrille Comar - Looking Aheadjamieayre
 
AdaCore Paris Tech Day 2016: Fabien Chouteau - Making the Ada Drivers Library
AdaCore Paris Tech Day 2016: Fabien Chouteau - Making the Ada Drivers LibraryAdaCore Paris Tech Day 2016: Fabien Chouteau - Making the Ada Drivers Library
AdaCore Paris Tech Day 2016: Fabien Chouteau - Making the Ada Drivers Libraryjamieayre
 
AdaCore Paris Tech Day 2016: Arnaud Chalet - GNAT Pro Roadmap
AdaCore Paris Tech Day 2016: Arnaud Chalet - GNAT Pro RoadmapAdaCore Paris Tech Day 2016: Arnaud Chalet - GNAT Pro Roadmap
AdaCore Paris Tech Day 2016: Arnaud Chalet - GNAT Pro Roadmapjamieayre
 
AdaCore Paris Tech Day 2016: Jamie Ayre - Market Perspective
AdaCore Paris Tech Day 2016: Jamie Ayre - Market PerspectiveAdaCore Paris Tech Day 2016: Jamie Ayre - Market Perspective
AdaCore Paris Tech Day 2016: Jamie Ayre - Market Perspectivejamieayre
 

More from jamieayre (17)

HIS 2017 Mark Batty-Industrial concurrency specification for C/C++
HIS 2017 Mark Batty-Industrial concurrency specification for C/C++HIS 2017 Mark Batty-Industrial concurrency specification for C/C++
HIS 2017 Mark Batty-Industrial concurrency specification for C/C++
 
HIS 2017 David Oswald- Your car is not a safe box - breaking automotive keyle...
HIS 2017 David Oswald- Your car is not a safe box - breaking automotive keyle...HIS 2017 David Oswald- Your car is not a safe box - breaking automotive keyle...
HIS 2017 David Oswald- Your car is not a safe box - breaking automotive keyle...
 
HIS 2017 Paul Sherwood- towards trustable software
HIS 2017 Paul Sherwood- towards trustable software HIS 2017 Paul Sherwood- towards trustable software
HIS 2017 Paul Sherwood- towards trustable software
 
HIS 2017 Marie Moe- Unpatchable-Living with a Vulnerable Implanted Device
HIS 2017 Marie Moe- Unpatchable-Living with a Vulnerable Implanted DeviceHIS 2017 Marie Moe- Unpatchable-Living with a Vulnerable Implanted Device
HIS 2017 Marie Moe- Unpatchable-Living with a Vulnerable Implanted Device
 
HIS 2017 Jonathan Pallant- Delivering quality, time after time
HIS 2017 Jonathan Pallant-  Delivering quality, time after timeHIS 2017 Jonathan Pallant-  Delivering quality, time after time
HIS 2017 Jonathan Pallant- Delivering quality, time after time
 
HIS 2017 Peter Ladkin- Rigorous-Assurance Points in Software Development
HIS 2017 Peter Ladkin-  Rigorous-Assurance Points in Software DevelopmentHIS 2017 Peter Ladkin-  Rigorous-Assurance Points in Software Development
HIS 2017 Peter Ladkin- Rigorous-Assurance Points in Software Development
 
HIS 2017 Dewi Daniels- bridging the gap between manned and unmanned
HIS 2017 Dewi Daniels- bridging the gap between manned and unmannedHIS 2017 Dewi Daniels- bridging the gap between manned and unmanned
HIS 2017 Dewi Daniels- bridging the gap between manned and unmanned
 
HIS 2017 Roderick chapman- Secure Updates for Embedded Systems
HIS 2017 Roderick chapman- Secure Updates for Embedded SystemsHIS 2017 Roderick chapman- Secure Updates for Embedded Systems
HIS 2017 Roderick chapman- Secure Updates for Embedded Systems
 
AdaCore Paris Tech Day 2016: Jose Ruiz - QGen Tech Update
AdaCore Paris Tech Day 2016: Jose Ruiz - QGen Tech UpdateAdaCore Paris Tech Day 2016: Jose Ruiz - QGen Tech Update
AdaCore Paris Tech Day 2016: Jose Ruiz - QGen Tech Update
 
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
AdaCore Paris Tech Day 2016: Jerome Lambourg - Cross and BareBoard Team Insid...
 
AdaCore Paris Tech Day 2016: Eric Perlade - Verification Solutions
AdaCore Paris Tech Day 2016: Eric Perlade - Verification SolutionsAdaCore Paris Tech Day 2016: Eric Perlade - Verification Solutions
AdaCore Paris Tech Day 2016: Eric Perlade - Verification Solutions
 
AdaCore Paris Tech Day 2016: Elie Richa - Integrated Unit Testing for a Trust...
AdaCore Paris Tech Day 2016: Elie Richa - Integrated Unit Testing for a Trust...AdaCore Paris Tech Day 2016: Elie Richa - Integrated Unit Testing for a Trust...
AdaCore Paris Tech Day 2016: Elie Richa - Integrated Unit Testing for a Trust...
 
AdaCore Paris Tech Day 2016: Pierre-Marie Rodat - Libadalang, New Generation ...
AdaCore Paris Tech Day 2016: Pierre-Marie Rodat - Libadalang, New Generation ...AdaCore Paris Tech Day 2016: Pierre-Marie Rodat - Libadalang, New Generation ...
AdaCore Paris Tech Day 2016: Pierre-Marie Rodat - Libadalang, New Generation ...
 
AdaCore Paris Tech Day 2016: Cyrille Comar - Looking Ahead
AdaCore Paris Tech Day 2016: Cyrille Comar - Looking AheadAdaCore Paris Tech Day 2016: Cyrille Comar - Looking Ahead
AdaCore Paris Tech Day 2016: Cyrille Comar - Looking Ahead
 
AdaCore Paris Tech Day 2016: Fabien Chouteau - Making the Ada Drivers Library
AdaCore Paris Tech Day 2016: Fabien Chouteau - Making the Ada Drivers LibraryAdaCore Paris Tech Day 2016: Fabien Chouteau - Making the Ada Drivers Library
AdaCore Paris Tech Day 2016: Fabien Chouteau - Making the Ada Drivers Library
 
AdaCore Paris Tech Day 2016: Arnaud Chalet - GNAT Pro Roadmap
AdaCore Paris Tech Day 2016: Arnaud Chalet - GNAT Pro RoadmapAdaCore Paris Tech Day 2016: Arnaud Chalet - GNAT Pro Roadmap
AdaCore Paris Tech Day 2016: Arnaud Chalet - GNAT Pro Roadmap
 
AdaCore Paris Tech Day 2016: Jamie Ayre - Market Perspective
AdaCore Paris Tech Day 2016: Jamie Ayre - Market PerspectiveAdaCore Paris Tech Day 2016: Jamie Ayre - Market Perspective
AdaCore Paris Tech Day 2016: Jamie Ayre - Market Perspective
 

Recently uploaded

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxalwaysnagaraju26
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 

Recently uploaded (20)

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 

HIS 2017 Robert Martin- assured software a journey and discussion-final

  • 1.
  • 2.
  • 3. Agriculture and Food Energy Transportation Chemical Industry Postal and Shipping Water Public Health Telecommunications Banking and Finance Key Assets
  • 4.
  • 5.
  • 6.
  • 7.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1520 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cybersecurity information exchange – Vulnerability/state exchange Common vulnerabilities and exposures Recommendation ITU-T X.1520 x U n i ó n I n t e r n a c i o n a l d e T e l e c o m u n i c a c i o n e s UIT-T X.1520 SECTOR DE NORMALIZACIÓN DE LAS TELECOMUNICACIONES DE LA UIT (04/2011) SERIE X: REDES DE DATOS, COMUNICACIONES DE SISTEMAS ABIERTOS Y SEGURIDAD Intercambio de información de ciberseguridad – Intercambio de estados/vulnerabilidad Vulnerabilidades y exposiciones comunes Recomendación UIT-T X.1520 U n i o n i n t e r n a t i o n a l e d e s t é l é c o m m u n i c a t i o n s UIT-T X.1520 SECTEUR DE LA NORMALISATION DES TÉLÉCOMMUNICATIONS DE L'UIT (04/2011) SÉRIE X: RÉSEAUX DE DONNÉES, COMMUNICATION ENTRE SYSTÈMES OUVERTS ET SÉCURITÉ Echange d'informations sur la cybersécurité – Echange concernant les vulnérabilités/les états Vulnérabilités et expositions courantes Recommandation UIT-T X.1520 ITU-T X.1520 (04/2011) X – ITU-T X.1520 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1521 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2016) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cybersecurity information exchange Vulnerability/state exchange Common vulnerability scoring system 3.0 Recommendation ITU-T X.1521 X.1520 ITU-T (2011/04) X: / (CVE) ITU-T X.1520
  • 19. TM
  • 20.
  • 21.
  • 22.
  • 23.
  • 25.
  • 26.
  • 27. TMSS
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1525 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2015) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cybersecurity information exchange Vulnerability/state exchange Common weakness scoring system Recommendation ITU-T X.1525
  • 34. I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1524 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2012) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cybersecurity information exchange – Vulnerability/state exchange Common weakness enumeration Recommendation ITU-T X.1524 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1544 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2013) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cybersecurity information exchange – Event/incident/heuristics exchange Common attack pattern enumeration and classification Recommendation ITU-T X.1544 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1525 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2015) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cybersecurity information exchange Vulnerability/state exchange Common weakness scoring system Recommendation ITU-T X.1525
  • 36. CWSS for Top 25 Ground System CWE’s CWE ID CWE Title CWSS 23 Relative Path Traversal 23.63885 88 Argument Injection or Modification 12.369 20 Improper Input Validation 12.121 119 Improper Restriction of Operations within the Bounds of a Memory Buffer 11.0295 73 External Control of File Name or Path 10.2465 835 Loop with Unreachable Exit Condition ('Infinite Loop') 10.135125 772 Missing Release of Resource after Effective Lifetime 10.0035 833 Deadlock 9.804375 764 Multiple Locks of a Critical Resource 9.804375 421 Race Condition During Access to Alternate Channel 9.696375 22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 9.57825 732 Incorrect Permission Assignment for Critical Resource 9.57825 77 Improper Neutralization of Special Elements used in a Command ('Command Injection') 9.3555 251 Often Misused: String Management 9.288 788 Access of Memory Location After End of Buffer 9.288 787 Out-of-bounds Write 9.288 134 Uncontrolled Format String 9.288 131 Incorrect Calculation of Buffer Size 9.288 805 Buffer Access with Incorrect Length Value 9.288 192 Integer Coercion Error 8.68725 197 Numeric Truncation Error 8.68725 681 Incorrect Conversion between Numeric Types 8.68725 497 Exposure of System Data to an Unauthorized Control Sphere 8.68725 290 Authentication Bypass by Spoofing 8.68725 367 Time-of-check Time-of-use (TOCTOU) Race Condition 8.5201875 CWSS for Top 25 Flight System CWE’s CWE ID CWE Title CWSS 120 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) 10.64475 772 Missing Release of Resource after Effective Lifetime 10.0035 134 Uncontrolled Format String 9.828 665 Improper Initialization 9.828 119 Improper Restriction of Operations within the Bounds of a Memory Buffer 9.828 251 Often Misused: String Management 9.828 131 Incorrect Calculation of Buffer Size 9.828 805 Buffer Access with Incorrect Length Value 9.828 788 Access of Memory Location After End of Buffer 9.828 787 Out-of-bounds Write 9.828 764 Multiple Locks of a Critical Resource 9.804375 833 Deadlock 9.804375 20 Improper Input Validation 9.6985 835 Loop with Unreachable Exit Condition (‘Infinite Loop’) 9.244125 122 Heap-based Buffer Overflow 8.964 121 Stack-based Buffer Overflow 8.964 190 Integer Overflow or Wraparound 8.964 129 Improper Validation of Array Index 8.964 170 Improper Null Termination 8.802 197 Numeric Truncation Error 8.68725 457 Use of Uninitialized Variable 8.68725 416 Use After Free 8.68725 681 Incorrect Conversion between Numeric Types 8.68725 192 Integer Coercion Error 8.68725 468 Incorrect Pointer Scaling 8.68725
  • 37.
  • 38.
  • 39. CISQ Specifications for Automated Quality Characteristic Measures Reliability Performance Efficiency Security Maintainability
  • 40.
  • 41.
  • 42. Reality is more complex and more changing…
  • 43. What artifacts can be examined to predict Quality Gaps?
  • 44. What artifacts can be examined to predict Quality Gaps?
  • 45. SW artifact SW artifact SW artifact SW artifact SW artifact CONOPS Requirements Architecture Design Environment Use of SW Process Code Binary Running Binary OperateCodeArchitecture DesignConcept
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59. Date: August 2010 Argumentation Metamodel (ARM) FTF - Beta 1 OMG Document Number: ptc/2010-08-36 Standard document URL: http://www.omg.org/spec/ARM Associated Schema Files: sysa/2010-03-16 -- http://www.omg.org/spec/ARM/20100301 sysa/2010-03-17 -- http://www.omg.org/spec/ARM/20100302 This OMG document replaces the submission document (sysa/2010-03-05, Alpha). It is an OMG Adopted Beta Specification and is currently in the finalization phase. Comments on the content of this document are welcome, and should be directed to issues@omg.org by February 1, 2011. You may view the pending issues for this specification from the OMG revision issues web page http://www.omg.org/issues/. The FTF Recommendation and Report for this specification will be published on July 1, 2011. If you are reading this after that date, please download the available specification from the OMG Specifications Catalog. Date: August 2010 Software Assurance Evidence Metamodel (SAEM) FTF - Beta 1 OMG Document Number: ptc/2010-08-37 Standard document URL: http://www.omg.org/spec/SAEM Associated Schema Files: sysa/2010-02-02 -- http://www.omg.org/spec/SAEM/20100201 sysa/2010-02-03 -- http://www.omg.org/spec/SAEM/20100202 sysa/2010-02-04 -- http://www.omg.org/spec/SAEM/20100203 sysa/2010-02-05 -- http://www.omg.org/spec/SAEM/20100204 This OMG document replaces the submission document (sysa/2010-03-05, Alpha). It is an OMG Adopted Beta Specification and is currently in the finalization phase. Comments on the content of this document are welcome, and should be directed to issues@omg.org by February 1, 2011. You may view the pending issues for this specification from the OMG revision issues web page http://www.omg.org/issues/. The FTF Recommendation and Report for this specification will be published on July 1, 2011. If you are reading this after that date, please download the available specification from the OMG Specifications Catalog.
  • 60. ARMetamodel SBVR Semantic Business Vocabulary & Rules KDM Knowledge Discovery Metamodel SAEM Software Assurance Evidence Metamodel SACM Structured Assurance Case Metamodel Date: April 2012 Structured Assurance Case Metamodel (SACM) FTF - Convenience Document 1 OMG Document Number: ptc/2012-04-04 Standard document URL: http://www.omg.org/spec/SACM Associated Schema Files: sysa/2010-03-16 -- http://www.omg.org/spec/ARM/20100301 sysa/2010-03-17 -- http://www.omg.org/spec/ARM/20100302 sysa/2010-02-02 -- http://www.omg.org/spec/SAEM/20100201 sysa/2010-02-03 -- http://www.omg.org/spec/SAEM/20100202 sysa/2010-02-04 -- http://www.omg.org/spec/SAEM/20100203 sysa/2010-02-05 -- http://www.omg.org/spec/SAEM/20100204 This OMG document replaces the individual adopted specifications (ptc/2010-08-36, ARM, Beta 1 and ptc/2010-08-37, SAEM, Beta 1). It is an OMG Adopted Beta Specification and is currently in the finalization phase. Comments on the content of this document are welcome, and should be directed to issues@omg.org by February 1, 2011. You may view the pending issues for this specification from the OMG revision issues web page http://www.omg.org/issues/. The FTF Recommendation and Report for this specification will be published on July 24, 2012. If you are reading this after that date, please download the available specification from the OMG Specifications Catalog.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65. Evidence of Trustworthiness as Assurance Cases