Browse by Tags

Tagged Content List
  • Blog Post: CAT.NET New Build – 1.1.1.8

    Mainly small bug fixes and a new feature to export the findings into an Excel spreadsheet. Download link is - http://www.microsoft.com/downloads/details.aspx?FamilyId=0178e2ef-9da8-445e-9348-c93f24cc9f9d&displaylang=en   We recommend all users to upgrade to this version. We have some work now...
  • Blog Post: Getting Help for CAT.NET and Anti-XSS

    We now have a discussion forum for users of CAT.NET. There is no official support for these tools but you can ask questions and we will try to help wherever we can! CAT.NET - http://social.msdn.microsoft.com/Forums/en-US/catnet/threads/ Anti-XSS - http://www.codeplex.com/AntiXSS/Thread/List.aspx
  • Blog Post: MSDN Webcast: Software Security with Static Code Analysis Using CAT.NET (Level 200)

    Event Overview In this webcast, we provide an overview of what static code analysis is and typical coding errors that static analysis can and cannot detect. We also look at the recently released CAT.NET tool and how it helps with the detection of security flaws. Presenter: Andreas Fuchsberger, Senior...
  • Blog Post: Current Memory Limitations of CAT.NET

    Hi, Andreas Fuchsberger here..... It is important to understand what happens CAT.NET builds its Call Flow Super Graphs. We use a CCI object called CciControlGraph to build a Control Flow Graph for each method and each method call we find in the Common Intermediate Language (CIL) of the modules being...
  • Blog Post: Free MSDN Webcast: Managing Cross-Site Scripting Using CAT.NET and AntiXSS (Level 200)

    Language(s): English. Product(s): Security. Audience(s): Developer. Duration: 60 Minutes Start Date: Friday, January 09, 2009 12:00 PM Pacific Time (US & Canada) Register Here
  • Blog Post: Merlin: Better Specifications for CAT.NET

    Guest post by Ben Livshits of Microsoft Research here.... In the last several years we have seen a proliferation of static (and sometimes runtime) analysis tools for finding web application vulnerabilities. Companies such as Fortify, Ouncelabs, Klockwork, and others have been selling tools for finding...
  • Blog Post: Security Code Review Using CAT.NET - Part 2

    Hi Andreas Fuchsberger here again...... How does CAT.NET work? As I mentioned in Part 1 here , CAT.NET is an information-flow type static analysis tool using an implementation of tainted-variable analysis. Tainted-variable analysis is an integrity problem in which that tries to identify whether less...
  • Blog Post: Security Code Review Using CAT.NET - Part 1

    Hi Andreas Fuchsberger here … To coincide with the CTP release of CAT.NET and Anti-XSS , within the CSIG we have been taking a long hard look at static analysis tools for developers and Information Security professionals. Over the next series of blog posts I will explain the fundamentals of the...
  • Blog Post: CAT.NET CTP Links Are Live Again!

    Download CAT.NET CTP ( 32 bit here and 64 bit here ) Anti-XSS was not affected but for completeness Download Anti-XSS 3.0 Beta ( here and source code here ) Our sincere apologies.
  • Blog Post: Secure String in .Net - Part II

    Hi Gaurav Sharma here with more information about SecureStrings. This time I'll cover following topics: SecureString internals Performance Let us start with our first topic, SECURE STRING INTERNALS BASICS Class Name: SecureString Assembly: mscorlib.dll Latest Version: 2.0.0.0 Namespace: System.Security...
  • Blog Post: Using Role Based Access Control in the .NET Framework - Part 2

    Vineet Batta here again.. In my last blog I discussed how to use role based access control (RBAC) and described how we can restrict access to the method based on the declarative method. In today's blog I will explain how to use Imperative role based demands. The end effect is the same, but using an...
  • Blog Post: Using Role Based Access Control in the .NET Framework - Part 1

    Hi Vineet Batta here.. Consider a scenario where you want to write an assembly which contains methods that only certain type of users can call (domain\Administrators or a specific custom users account). So how can we control this within code and let the runtime enforce these security checks? Example...
Page 1 of 1 (12 items)