The Secure Coding Initiative at CERT has published several TRs recently.  Sorry 
I've been slow in sending out updates to the list.

Please let me know if you have any questions about any of these reports or are 
interested in collaborating with CERT to advance these projects.

Thanks,
rCs

________________________________

Java Concurrency Guidelines

Fred Long, Dhruv Mohindra, Robert Seacord, & David Svoboda
CMU/SEI-2010-TR-015



An essential element of secure coding in the Java programming language is 
well-documented and enforceable coding standards. Coding standards encourage 
programmers to follow a uniform set of guidelines determined by the 
requirements of the project and organization, rather than by the programmer's 
familiarity or preference. Once established, these standards can be used as a 
metric to evaluate source code (using manual or automated processes).

The CERT Oracle Secure Coding Standard for Java provides guidelines for secure 
coding in the Java programming language. The goal of these guidelines is to 
eliminate insecure coding practices and undefined behaviors that can lead to 
exploitable vulnerabilities. Applying this standard will lead to higher quality 
systems that are robust and more resistant to attack.

This report documents the portion of those Java guidelines that are related to 
concurrency.

________________________________

keywords: Java, concurrency, software security, coding standard, coding 
guidelines

cover date: May 2010

distribution: unlimited

editor: Pennie Walters (p...@sei.cmu.edu<mailto:p...@sei.cmu.edu>)
www.sei.cmu.edu/library/abstracts/reports/10tr015.cfm<http://www.sei.cmu.edu/library/abstracts/reports/10tr015.cfm>
________________________________

As-If Infinitely Ranged Integer Model, Second Edition
Roger Dannenberg, Will Dormann, David Keaton, Thomas Plum, Robert C. Seacord, 
David Svoboda, Alex Volkovitsky, & Timothy Wilson

CMU/SEI-2010-TN-008



Integers represent a growing and underestimated source of vulnerabilities in C 
and C++ programs. This report presents the as-if infinitely ranged (AIR) 
integer model that provides a largely automated mechanism for eliminating 
integer overflow and truncation and other integral exceptional conditions. The 
AIR integer model either produces a value equivalent to that obtained using 
infinitely ranged integers or results in a runtime-constraint violation. 
Instrumented fuzz testing of libraries that have been compiled using a 
prototype AIR integer compiler has been effective in discovering 
vulnerabilities in software with low false positive and false negative rates.  
Furthermore, the runtime overhead of the AIR integer model is low enough for 
typical applications to enable it in deployed systems for additional runtime 
protection.

________________________________

keywords: security, standardization, languages, verification, reliability, fuzz 
testing, software security, integral security, secure coding

cover date: April 2010

distribution: unlimited

editor: Pennie Walters (p...@sei.cmu.edu<mailto:p...@sei.cmu.edu>)
http://www.sei.cmu.edu/library/abstracts/reports/10tn008.cfm
________________________________

Specifications for Managed Strings, Second Edition
Hal Burch, Fred Long, Raunak Rungta, Robert C. Seacord, & David Svoboda

CMU/SEI-2010-TR-018



This report describes a managed string library for the C programming language. 
Many software vulnerabilities in C programs result from the misuse of 
manipulation functions for standard C strings. Programming errors common to 
string-manipulation logic include buffer overflow, truncation errors, string 
termination errors, and improper data sanitization. The managed string library 
provides mechanisms to eliminate or mitigate these problems and improve system 
security. The CERT Program, which is part of the Carnegie Mellon Software 
Engineering Institute, provides a proof-of-concept implementation of the 
managed string library on its Secure Coding web pages.

________________________________

keywords: string library, software security, C programming, runtime-constraint 
handling

cover date: May 2010

distribution: unlimited

editor: Paul Ruggiero (pruggi...@sei.cmu.edu<mailto:pruggi...@sei.cmu.edu>)
www.sei.cmu.edu/library/abstracts/reports/10tr018.cfm<http://www.sei.cmu.edu/library/abstracts/reports/10tr018.cfm>

Thanks,
rCs

----
Robert C. Seacord
Secure Coding Team Lead
CERT / Software Engineering Institute
Work: +1 412.268.7608
FAX:    +1 412.268.6989
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to