SoftwareSecurity2014/Group 8

Uit Werkplaats
Ga naar: navigatie, zoeken

Group nr. 8

Group members:

all from UTwente


(Erik:Good work!)

Topic: Input Validation for Wordpress 3.8.1

wp_logo.png

Deliverables

The log should be a chronological list of who has been doing what, with dates.
Also useful to document decisions on who will be doing what, and by when.
This section gives a brief overview of our case study.
This section discusses the results of the code scanning for our Verification Requirements.
Our impressions of the tools in capabilities, limitations, etc, and what we learned from them about specific security vulnerabilities.
The results of manual code review for part 2B
Our verdict for each requirement (Pass/Fail/Don't know) with motivation and an indication of what we did to reach this verdict.
Our reflection on the whole process of doing a code review, or "Application Security Verification", in the way we did.