lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.64.1305101321020.7327@webappsec>
Date: Fri, 10 May 2013 13:21:49 -0500 (CDT)
From: announcements@...appsec.org
To: bugtraq@...urityfocus.com
Subject: WASC Announcement: Static Analysis Technologies Evaluation Criteria
 Published

The Web Application Security Consortium (WASC) is pleased to announce the
Static Analysis Technologies Evaluation Criteria. The goal of the SATEC
project is to create a vendor-neutral set of criteria to help guide
application security professionals during the process of acquiring a
static code analysis technology that is intended to be used during
source-code driven security programs. This document provides a
comprehensive list of criteria that should be considered during the
evaluation process.

WASC Static Analysis Technologies Evaluation Criteria
http://projects.webappsec.org/Static%20Analysis%20Technologies%20Evaluation%20Criteria


Target Audience:
The target audience of this document is the technical staff of software
organizations who are looking to automate parts of their application
security assurance programs using one or more static code analysis
technology, as well as application security professionals who are
responsible for performing application security reviews. The document will
take into consideration those who would be evaluating the technology and
those who would actually be using it.


Scope:
The purpose of this document is to develop a set of criteria that should
be taken into consideration while evaluating static code analysis tools or
services for security testing. The vendor-neutral criteria defined in this
document are selected using a consensus-driven review process comprised of
volunteer subject matter experts. Every organization is unique and has a
unique software development environment, this document aims to help
organizations achieve their application security goals through acquiring
the most suitable tool for their own unique environment. The document will
strictly stay away from evaluating or rating vendors. However, it will
focus on the most important aspects of static code analysis technologies
that would help the target audience identify the best technology for their
environment and development needs.


Contributors:
- Aaron Weaver (Pearson Education)
- Abraham Kang (HP Fortify)
- Alec Shcherbakov (AsTech Consulting)
- Alen Zukich  (Klocwork)
- Arthur Hicken (Parasoft)
- Amit Finegold (Checkmarx)
- Benoit Guerette (NorthSec)
- Chris Eng (Veracode)
- Chris Wysopal (Veracode)
- Dan Cornell (Denim Group)
- Daniel Medianero (Buguroo Offensive Security)
- Dinis Cruz (SecurityInnovation)
- Gamze Yurttutan
- Herman Stevens
- Janos Drencsan
- James McGovern (HP)
- Jean-Marc Atchison (Centauri Technologies))
- Joe Hemler (Gotham Digital Science)
- Jojo Maalouf (Hydro Ottawa)
- Laurent Levi  (Checkmarx)
- Mushtaq Ahmed (Emirates Airlines)
- Ory Segal (IBM)
- Philippe Arteau
- Sherif Koussa (Software Secured) [Project Leader]
- Srikanth Ramu (University of British Columbia)
- Romain Gaucher  (Coverity)
- Sneha  Phadke (eBay)
- Wagner Elias (Conviso)


Contact:
Participation in the Web Application Security Scanner Evaluation Criteria
project is open to all.  If you have any questions about the evaluation
criteria, please contact Sherif Koussa ( sherif dot koussa at gmail dot
com)

Regards,
- announcements () webappsec () org
http://www.webappsec.org/
The Web Application Security Consortium

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ