{"id":429,"date":"2015-10-07T08:40:00","date_gmt":"2015-10-07T06:40:00","guid":{"rendered":"https:\/\/webs.uab.cat\/hpc4eas\/blog\/new-tutorial-automated-assessment-tools\/"},"modified":"2015-10-07T08:40:00","modified_gmt":"2015-10-07T06:40:00","slug":"new-tutorial-automated-assessment-tools","status":"publish","type":"blog","link":"https:\/\/webs.uab.cat\/hpc4eas\/blog\/new-tutorial-automated-assessment-tools\/","title":{"rendered":"New Tutorial on Automated Assessment Tools"},"content":{"rendered":"<p><a href=\"http:\/\/grupsderecerca.uab.cat\/hpc4eas\/Elisa.Heymann\" target=\"_blank\" rel=\"noopener\">Elisa Heymann: <\/a>New Tutorial on <strong>Automated Assessment Tools<\/strong> at the <a href=\"http:\/\/www.cse.unr.edu\/SEDE\/\" target=\"_blank\" rel=\"noopener\">24th International Conference on Software Engineering and Data Engineering (SEDE 2015)<\/a>.<\/p>\n<p>Software assurance tools \u2013 tools that scan the source or binary code of a program to find weaknesses \u2013 are the first line of defense in assessing the security of a software project. These tools can catch flaws in a program that can affect both the correctness and safety of the code.<br \/>\nThe tutorial will start with basic background material about how software assessment tools work, the capabilities and limitations of such tools. It will then focus on a selection of both commercial and open source tools for C\/C++ and Java, and demonstrate how to apply them to sample programs with known flaws. It will conclude with a live demonstration.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-428\" alt=\"\" height=\"578\" src=\"https:\/\/webs.uab.cat\/hpc4eas\/wp-content\/uploads\/sites\/289\/2015\/10\/ehc.png\" width=\"640\" srcset=\"https:\/\/webs.uab.cat\/hpc4eas\/wp-content\/uploads\/sites\/289\/2015\/10\/ehc.png 640w, https:\/\/webs.uab.cat\/hpc4eas\/wp-content\/uploads\/sites\/289\/2015\/10\/ehc-300x271.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Elisa Heymann: New Tutorial on Automated Assessment Tools at the 24th International Conference on Software Engineering and Data Engineering (SEDE 2015). Software assurance tools \u2013 tools that scan the source or binary code of a program to find weaknesses \u2013 are the first line of defense in assessing the security of a software project. These [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":428,"template":"","class_list":["post-429","blog","type-blog","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/blog\/429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/users\/20"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/media\/428"}],"wp:attachment":[{"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/media?parent=429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}