Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Our aim is always to leverage simplicity and usefulness, so finally we decided to base Kiuwan Vulnerability Types upon Wheeler & Moorthy’s paper.

Ref: State-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation” paper (http://www.acq.osd.mil/se/docs/P-5061-software-soar-mobility-Final-Full-Doc-20140716.pdfState-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation) and related works (NSA Center for Assured Software, 2012 and 2011, https://samate.nist.gov/docs/CAS%202012%20Static%20Analysis%20Tool%20Study%20Methodology.pdf and https://samate.nist.gov/docs/CAS_2011_SA_Tool_Method.pdf, respectively NSA-2012 and NSA-2011).

 Based on that (we added our 2 cents, of course), Kiuwan considers following Vulnerability Types:

...