...P ra c t i c a l ve ri f i c a t i o n & s a fe g u a rd tools for C/C++ F Michaud . R. Carbone DRDC Valcartier Defence R&D Canada – Valcartier Technical Report DRDC Valcartier TR 2006-735 November 2007 Practical verification & safeguard tools for C/C++ F. Michaud R. Carbone DRDC Valcartier DRDC Valcartier Technical Report DRDC Valcartier TR 2006-735 November 2007 Principal Author Approved by Yves van Chestein Head/IKM Approved for release by Christian Carrier Chief Scientist c Her Majesty the Queen in Right of Canada as represented by the Minister of National Defence, 2007 c Sa Majest´ la Reine (en droit du Canada), telle que repr´sent´e par le ministre de la e e e D´fense nationale, 2007 e Abstract This document is the final report of an activity that took place in 2005-2006. The goal of this project was first to identify common software defects related to the use of the C and C++ programming languages. Errors and vulnerabilities created by these defects were also investigated, so that meaningful test cases could be created for the evaluation of best-ofbreed automatic verification tools. Finally, when relevant, best practices were inferred from our experiments with these tools. ´ ´ Resume Ce document est le rapport final d’un projet de recherche qui a eu lieu en 2005-2006. Le but de ce projet ´tait avant tout d’identifier les d´fauts logiciels courants li´s ` l’utilisation des e e e a langages de programmation C et C++. Les erreurs et vuln´rabilit´s...
Words: 22394 - Pages: 90
...Technical Report CMU/SEI-90-TR-24 ESD-90-TR-225 Software Engineering Process Group Guide Priscilla Fowler Stan Rifkin September 1990 Technical Report CMU/SEI-90-TR-24 ESD-90-TR-225 September 1990 Software Engineering Process Group Guide Priscilla Fowler Technology Applications Project Stan Rifkin Software Process Development Project with an appendix by David M. Card Computer Sciences Corporation Approved for public release. Distribution unlimited. JPO approval signature on file. Software Engineering Institute Carnegie Mellon University Pittsburgh, Pennsylvania 15213 Table of Contents Preface Introduction Part I — Starting a Process Group 1. The Process Group 1.1. Costs and Benefits 1.1.1. Costs 1.1.2. Benefits 1.2. Organizing for Process Improvement: The Collaborators 1.2.1. The Steering Committee 1.2.2. Technical Working Groups 2. Assessments 2.1. Example of an Assessment Method 2.2. Principles 2.3. Phases of an Assessment 3. Action Plan 3.1. Structure 3.2. Development 3.3. Ownership 3.4. Action Plans With Multiple Assessments 3.5. Action Plans Without Assessment 4. Describing and Defining the Software Process 4.1. Describing the Existing Process 4.1.1. Documenting the Process: One Approach 4.2. Defining the Desired Process 4.3. Process Definition and CASE Technology 5. The Process Database 5.1. Measurement 5.1.1. Visibility 5.1.2. Types of Measurement 5.1.3. Definition of Measures 5.1.4. Suggestions 5.2. The Database 5.3. Defect Prevention...
Words: 39385 - Pages: 158
...Approaches to Process Performance Modeling: A Summary from the SEI Series of Workshops on CMMI High Maturity Measurement and Analysis Robert W. Stoddard II Dennis R. Goldenson January 2010 TECHNICAL REPORT CMU/SEI-2009-TR-021 ESC-TR-2009-021 Software Engineering Measurement and Analysis Unlimited distribution subject to the copyright. http://www.sei.cmu.edu This report was prepared for the SEI Administrative Agent ESC/XPK 5 Eglin Street Hanscom AFB, MA 01731-2100 The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange. This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense. Copyright 2010 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this report is not intended in any way to infringe on...
Words: 27376 - Pages: 110
...SECR 6000 Research Study – Time to update the DoD Personnel Security regulation Submitted by R. Allen Green Prepared for Dr. Beth Vivaldi SECR 6000 Security Management Fall II, 2012 Webster University December 12, 2012 CERTIFICATE OF AUTHORSHIP: I certify that I am the author. I have cited all sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course. TABLE OF CONTENTS Cover Page……...…………………………………………………………………………………1 Table of Contents…………....…………………………………………………………………….2 Definitions and Terms…………………………………………………………………………......4 Chapter 1 – Introduction…………………………………………………………….…………….6 Background………………………………………………………………………………..6 Statement of the Problem………………………………………………………………….8 Purpose of the Study…………………………………………………………………..…10 Research Question(s)………………………………………………………………...…..10 Chapter 2 – Literature Review………………………………………………………………...…11 Legal and Ethical Issues in Security……………………………………………………..11 Security Administration and Management………………………………………………14 Business Asset Protection………………………………………………………………..16 Emergency Planning………………………………………………………………......…17 Information System Security……………………………………………………….……18 Behavior Issues……………………………………………………………………..……20 Chapter 3 – Methodology…………...………………………………………………………..….23 Research Design………………………………………………………………………….23 Data collection…………………………………………………………………...25 Data Analysis……………………………………………………………………...
Words: 7232 - Pages: 29
...and the relevant legislation; Questions involving knowledge of new approved accounting standards, approved auditing standards/guidelines and exposure drafts will not be set until at least 6 months have elapsed since the last day of the month in which the statement became effective or was published. (b) The list of accounting standards, auditing standards and other technical pronouncements, which are currently examinable in the Institute’s examination, are set out below. I. Approved Accounting Standards The Companies Act 1965 requires that approved accounting standards are to be applied to the financial statements of all companies. Approved accounting standards are issued by the Malaysian Accounting Standards Board (MASB), which is established under the Financial Reporting Act 1997. For the purposes of the MICPA pronouncements are examinable : examination, the following accounting (i) (ii) (iii) MASB approved accounting standards and other pronouncements issued by MASB; Malaysian Accounting Standards (MAS) issued by MICPA, which have not been replaced by MASB approved accounting standards; Technical Bulletins (TB) issued by MICPA, which are to be regarded as the best current practice in the area in question. The MASB has issued two set of accounting standards as follows: (a) Financial Reporting Standards (FRS) These standards are mandatory for all entities...
Words: 1953 - Pages: 8
...ETSI TR 101 984 V1.2.1 (2007-12) Technical Report Satellite Earth Stations and Systems (SES); Broadband Satellite Multimedia (BSM); Services and architectures 2 ETSI TR 101 984 V1.2.1 (2007-12) Reference RTR/SES-00274 Keywords architecture, broadband, IP, multimedia, satellite ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission...
Words: 13830 - Pages: 56
...• • M cl c 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Tài li Ph l Ph l Ph l ôi nét v quá trình nghiên c u và n n o v n .............................................................2 Các b c trong quá trình nghiên c u và trích d n .........................................................2 Th nào là trích d n tài li u? ...............................................................................................2 T m quan tr ng c a vi c trích d n tài li u ........................................................................3 Khi nào b n c n trích d n ngu n tin? ................................................................................3 Ki u trích d n nào b n ph i s d ng.................................................................................3 Phát tri n k n ng trích d n tài li u....................................................................................3 Quá trình trích d n và l p danh m c tài li u tham kh o .................................................3 Trích d n trong o n v n.....................................................................................................4 L p danh m c tài li u trích d n / tài li u tham kh o ........................................................5 u tham kh o.............................................................................................................................7 c 1: Ki u trích d n Harvard...................................................................................................8 c 2: Trích...
Words: 10657 - Pages: 43
...Chapter 1 Introduction The project is a interactive website for movies from all round the world. The purpose of the website is to provide a hands-on, easy-to-use information about all movie details at the click of a button. The website can be developed to be a large database which enlists movies which are famous internationally, and also those which are local favorites. The scope, therefore, is again that any movie detail can be found without much hassle. The website offers complete control to the registered user and he can buy movies tickets ,search for movies and provide appropriate feedback. It also provides tons of features such as a shopping cart for multiple movie ticket buying sections for buying dvd title of the movies etc. The user can post his comments about the movies on the website and interact with movie buffs from around the world. 2 Chapter 2 Problem Definition The project is an online movie store where people can buy movies tickets as well as dvd titles. The user will be able to point out any suggestions if present, interact with other users request for movie titles which are not available on the website, post comments on the listed movies subject to the administrator’s consent. The proposed project helps find movies tickets to any thaetres across any location of the multiplex. It also keeps the recent movies posted to the user so that he is aware of any new movies which he might...
Words: 5337 - Pages: 22
...3GPP TS 23.079 V5.6.0 (2005-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; Support of Optimal Routeing (SOR); Technical realization (Release 5) R GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organisational Partners and shall not be implemented. This Specification is provided for future development work within 3GPP only. The Organisational Partners accept no liability for any use of this Specification. Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organisational Partners' Publications Offices. Release 5 2 3GPP TS 23.079 V5.6.0 (2005-12) Keywords UMTS, GSM, network, addressing 3GPP Postal address 3GPP support office address 650 Route des Lucioles - Sophia Antipolis Valbonne - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Internet http://www.3gpp.org Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © 2005, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TTA, TTC). All rights reserved. 3GPP Release 5 3 3GPP TS 23.079 V5.6.0 (2005-12) Contents Foreword.....
Words: 13088 - Pages: 53
...TB 11-5800-229-10 TECHNICAL BULLETIN SYSTEM OVERVIEW GUIDE WARFIGHTER INFORMATION NETWORK - TACTICAL (WIN-T) INCREMENT 2 FInal Draft DISTRIBUTION STATEMENT C: Distribution authorized to U.S. Government Agencies and their contractors. This publication is required for administrative and operational purposes. This determination was made on 15 March 2011. Other requests for this document must be referred to Commander, U.S. Army CECOM Life Cycle Management Command (LCMC), ATTN: AMSEL-LCL-ECM, Aberdeen Proving Ground, MD 21005-1846. WARNING: This document contains technical data whose export is restricted by the Arms Export Control Act (Title 22, U.S.C., Sec 2751, et. seq.) or the Export Administration Act of 1979, as amended, Title 50A, U.S.C., App. Violations of these export laws are subject to severe criminal penalties. Disseminate in accordance with provisions of DoD Directive 5230.25.. DESTRUCTION NOTICE - Destroy by any method that will prevent disclosure of contents or reconstruction of the document. HEADQUARTERS, DEPARTMENT OF THE ARMY 15 JUNE 2012 TB 11-5800-229-10 LIST OF EFFECTIVE PAGES/WORK PACKAGES NOTE: The portion of text affected by the change is indicated by a vertical bar in the outer margins of the page. Changes to illustrations are indicated by a vertical bar adjacent to the title. Zero (0) in the “Change No.” column indicates an original page or work package. Date of issue for the original manual is: Original: 15 June 2012 TOTAL...
Words: 42929 - Pages: 172
...A BRIEF COMPUTER HISTORY The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. He designed the Analytical Engine and it was this design that the basic framework of the computers of today are based on. Generally speaking, computers can be classified into three generations. Each generation lasted for a certain period of time,and each gave us either a new and improved computer or an improvement to the existing computer. First generation: 1937 – 1946 - In 1937 the first electronic digital computer was built by Dr. John V. Atanasoff and Clifford Berry. It was called the Atanasoff-Berry Computer (ABC). In 1943 an electronic computer name the Colossus was built for the military. Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built. It is said that this computer weighed 30 tons, and had 18,000 vacuum tubes which was used for processing. When this computer was turned on for the first time lights dim in sections of Philadelphia. Computers of this generation could only perform single task, and they had no operating system. Second generation: 1947 – 1962 - This generation of computers used transistors instead of vacuum tubes which were more reliable. In 1951 the first computer for commercial use was introduced to the public; the Universal Automatic Computer (UNIVAC 1). In 1953 the International Business Machine (IBM)...
Words: 7002 - Pages: 29
...OF 2013 SUBJECT: CONSOLIDATED FDI POLICY. The “Consolidated FDI Policy” is attached. 2. This circular will take effect from April 5, 2013. (Anjali Prasad) Joint Secretary to the Government of India D/o IPP F. No. 5(1)/2013-FC.I Dated the 05.04.2013 Copy forwarded to: 1. 2. 3. 4. 5. Press Information Officer, Press Information Bureau- for giving wide publicity to the above circular. BE Section for uploading the circular on DIPP's website. Department of Economic Affairs, Ministry of Finance, New Delhi Reserve Bank of India, Mumbai Hindi Section for Hindi Translation 1 INDEX DESCRIPTION PAGE NUMBER CHAPTER-1 INTENT AND OBJECTIVE 1.1 Intent And Objective 5 5 CHAPTER-2 DEFINITIONS 2.1 Definitions 7 7 CHAPTER-3 GENERAL CONDITIONS ON FDI 3.1 Who can invest in India? 3.2. Entities into which FDI can be made 3.3 Types of Instruments 3.4 Issue/Transfer of Shares 3.5 Specific conditions in certain cases 3.6 Entry routes for Investment 3.7 Caps on Investments 3.8 Entry conditions on investment 3.9 Other conditions on Investment besides entry conditions 3.10 Foreign Investment into/Downstream Investment by Indian Companies 13 13 15 17 20 26 29 30 30 31 31 CHAPTER-4 CALCULATION OF FOREIGN INVESTMENT 4.1 Total Foreign Investment i.e. Direct and Indirect Foreign Investment in Indian Companies 33 33 CHAPTER-5 FOREIGN INVESTMENT PROMOTION BOARD (FIPB) 5.1 5.2 5.3 5.4 Constitution of FIPB Levels of approval for cases under Government Route Cases...
Words: 34628 - Pages: 139
.../m'cCall, Gene F./Waiters Software Quality for an Vk~~ '4 Paul K./RichA'rds -General Electric Company .,..... . 4- Approved for public release; distribution unlimited. ROME AIR DEVELOPMENT CENTER Air Force Systems Command Griffiss Air Force Base, New York 13441 This report has been reviewed by the PADC Information Office (01) and is releasable to the National Technical Information Service (NTIS). At NTIS it will be releasable to the general public, including foreign nations. RADC-TR-77-369, Vo] III (of three) has been reviewed and approved for publication. APPROVED: JOSEPH P. CAVANO Project Engineer APPROVED: (2 &4~L ( ALAN R. BARNUM, Assistant Chief information Sciences Division FOR THE COMMANDER: JOH" F . HUSS Acting Clief, Plans Office If your address has changed or if you wish to be removed from the RADC mailing list, or if the addressee is no longer employed by your organization, please notify RADC (ISIS) Griffiss AFB NY 13441. This will assist us in maintaining a current mailing list. Do not return this copy. Retain or destroy. SECURITY CLASSIFICATION OF THIS PAGE (IW.i, Vt e En eed)RE REPORT DOCUMENJATIO4 PAGE I. REPORT NU bER . D I S UC ON BFRE COMPTING ORM ... ' j2. GOVT ACCESSION NO. 3. ft9CIPIkNTIS CATALOG NUMBER RADC-TR-77-369, 4. TITLE (and Subtlfe) Vol III (of three) COVERED S. TYPE OF REPORT A P91111O0 Final Technical Report FACTORS IN SOFTWARE QUALITY Aug 76 - Jul 77 ...
Words: 6344 - Pages: 26
...Understanding Open Source Software Development Process Abstract: As the assignment requirement, we selected eclipse, Linux kernel and commercial software from the corporation of one member. It is the regret that we had not enough time to collect all statistics by ourselves, and instead of that, papers and blogs are the main resources for open source part in this document. The open source software is introduced before the commercial one. Keywords: development process, code ownership, defect density, bug lifetime Background: Linux Kernel In April 1991, Linus Torvalds, a 21-year-old student at the University of Helsinki, Finland started working on some simple ideas for an operating system. He started with a task switcher in Intel 80386 assembly language and a terminal driver. On 26 August 1991, Torvalds posted the following to comp.os.minix, a newsgroup on Usenet: I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones. This has been brewing since April, and is starting to get ready. I'd like any feedback on things people like/dislike in minix, as my OS resembles it somewhat (same physical layout of the file-system (due to practical reasons) among other things). After that, many people contributed code to the project. Early on, the MINIX community contributed code and ideas to the Linux kernel. At the time, the GNU Project had created many of the components required for a free operating system, but its own kernel...
Words: 9369 - Pages: 38
...AMBEDKAR UNIVERSITY, AGRA (FORMERLY AGRA UNIVERSITY) 2010 *Sanskrit verse dating back to the pre-Christian era Dedicated to my Teachers, Friends, Students and Family Members DECLARATION I do hereby declare that the present research work has been carried out by me under the supervision of Prof. Sunder Lal and Prof. S. C. Arora. This work has not been submitted elsewhere for any other degree, diploma, fellowship or any other similar title. Santosh Kumar Yadav Research Scholar CERTIFICATE This is to certify that the thesis entitled “Some Problems in Symmetric and Asymmetric Cryptography” submitted to Dr. B.R.Ambedkar University, Agra for the degree of Doctor of Philosophy by Mr. Santosh Kumar Yadav, is a bonafide record of research work done by him under our supervision. To the best of our knowledge, this thesis has not previously formed the basis for the award to any candidate of any degree, diploma, fellowship or any other similar title and the work has not been submitted to any university or institution, for the award of any other degree. S. C. ARORA SUNDER LAL (Co-supervisor) (Supervisor) Professor Professor of Mathematics, and Department of Mathematics Pro-Vice Chancellor University of Delhi Dr. B.R. Ambedkar University Delhi-110007 Agra-282002 ACKNOWLEDGEMENTS I am grateful to my supervisors Prof. Sunder Lal, Professor and Pro- Vice Chancellor of Dr. B.R. Ambedkar University, Agra and Prof. S.C.Arora, Professor, Department of Mathematics, University...
Words: 37424 - Pages: 150