Cybersecurity: SWAMP Helps Find Software Vulnerabilities

Cybersecurity is a continuing worry, especially with attacks such as the Stuxnet virus, which reportedly ruined several of Iran's nuclear centrifuges by worming its way into plants' industrial programmable logic controllers (PLCs). An organization called the Software Assurance Market Place or SWAMP aims to help users make their software more secure by finding weaknesses such as Heartbleed-like vulnerabilities.

The program is an online, open-source, collaborative research setting intended to let software developers and researchers test their software for security weaknesses, improve tools by testing against a wide range of software packages, and interact and exchange best practices to improve software assurance tools and techniques.

"SWAMP's goal is to help develop a healthier and safer cyber environment, and that starts with creating better quality software,” says Kevin Greene, Department of Homeland Security Science and Technology Directorate , Cyber Security Division, SWAMP Program Manager.

 SWAMP lets users address weaknesses in the software through an assessment platform comprising the open-source tools PMD, FindBugs, CppCheck, GCC, and Clang, as well as more than 100 open-source software packages. The program intends to expand its tool repository in the future to include dynamic and binary code assessments, commercial software analysis tools, and mobile platforms, as well as provide APIs for third-party services.

According to Greene, the SWAMP designers made sure that the site remains secure by implementing identity-based controls to protect submitters’ intellectual property. Users can submit software either on a public or a private security level. Public packages rely on crowdsourcing to encourage collaboration, resulting in better quality open-source software.

“Software requires several checks and balances during the development phase," says Greene. "Likewise, when someone is developing software for you, you would need to validate whether that software can be trusted. SWAMP serves as a resource to vet software and ensure it meets individual security requirements before being installed.”

 Read the full story


Show Comments
Hide Comments

Join the discussion

We welcome your thoughtful comments.
All comments will display your user name.

Want to participate in the discussion?

Register for free

Log in for complete access.


  • The dominant part of PCs gets contaminated from going to an extraordinarily created site page that endeavors one or various programming vulnerabilities. It could be by clicking a connection inside an email or essentially perusing the net and it happens noiselessly with no client cooperation at all. Online Essay Writing Service. Vulnerabilities are imperfections that exist in different projects and that enable somebody to make that bit of programming accomplish something it shouldn't do, for example, downloading and running malware.


  • According to a NIST research report, different tools find different weaknesses and over. This in turn will help advance the state of cybersecurity and improve. They are able to find code patterns and identify security vulnerabilities quickly. law essay help


  • I realize that the two sorts of knaves need to discover routes into secure spots—PCs and systems, and homes and organizations. Cheap Homework Assignments They have a scope of alternatives for how to get in.


  • Cybersecurity is one of the most important things that we need to do to protect our documents and files in the system from different viruses. Day by day hacking is increasing and the hackers are giving more concentration to hack the files of multinational companies. So always be alert.wholesale tablets bulk


  • This is a to an astounding degree lighting up article. I in like path agree with your post title and your truly well light up your point of view. I am splendidly energetic to see Write my Essay Online this post. A dedication of gratefulness is all together for share with us. Keep it up and share the more most related post. wonderful work!


RSS feed for comments on this page | RSS feed for all comments