SoftwareSecurity2013/Group 8

Uit Werkplaats
Ga naar: navigatie, zoeken

Group nr. 8

Group members:

  • Djurre Broekhuis
  • Gerlof Bouma
  • Matthijs Gielen
  • Tim van de Kamp
  • Wouter de Vries

all from University of Twente

Topic: Verification Requirements V5 for FluxBB

Deliverables

The log should be a chronological list of who has been doing what, with dates.
Also useful to document decisions on who will be doing what, and by when.
This describes the security requirements for your topic.
This should discuss the results of the code scanning, for the Verfication Requirements your group is looking at.
Describe your impressions about the tools, in capabilities, limitations, etc.
Also, did you learn anything about specific security vulnerabilities from using them?
This should give your verdict for each requirement (Pass/Fail/Don't know) with motivation, and an indication of what you did to reach this verdict.
Reflect on the whole process of doing a code review, or "Application Security Verification", in the way you did.