SoftwareSecurity2014/Group 10
Uit Werkplaats
Group nr. 10
Group members:
- Saurabh Kulkarni (TUE)
- Ben Brücker (RU)
- Tom Tervoort (UU)
- Niels Kamp (UT)
all from university RU/TUE/UT/UU
Case study: Piwigo 2.6.2
Verification Requirements:
- V3. Session Management
- V5. Input validation
- V6. Output Encoding/Escaping
- V7. Cryptography
Deliverables
- The log should be a chronological list of who has been doing what, with dates.
- Also useful to document decisions on who will be doing what, and by when.
- This should discuss the results of the code scanning, for the Verfication Requirements your group is looking at.
- Describe your impressions about the tools, in capabilities, limitations, etc.
- Also, did you learn anything about specific security vulnerabilities from using them?
- This should give your verdict for each requirement (Pass/Fail/Don't know) with motivation, and an indication of what you did to reach this verdict.
- Reflect on the whole process of doing a code review, or "Application Security Verification", in the way you did.
Create more sub-pages if you want, of course