Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

SAMATE Tool Survey

Classes of Tools & Techniques 

Here is a list of classes of software security assurance functions classified according to our tool taxonomy. The first group have web pages with comments or notes about the class. The last group in the table don't even have web pages.

 ProcessAutomationApproachViewpoint
Assurance Case ToolsSWE manage1Mitigate(?)Int
Safer LanguagesImplementation0PrecludeInt
Design/Modeling Verification ToolsDesign2/3DetectInt
Source Code Security AnalyzersByte Code ScannersBinary Code Scanners (SWEBOK 10 1.9)Test2DetectInt
Web Application ScannersTest/Operation2DetectExt
Intrusion DetectorsOperation2DetectInt
Network ScannersOperation2DetectExt
Requirements Verification ToolsRequirements2/3DetectInt
Architecture Design ToolsDesign1PrecludeInt
Dynamic Analysis ToolsTest1DetectExt
Web Services Network ScannersTest/Operation2DetectExt
Database Scanning ToolsOperation2DetectInt
Anti-Spyware Tools (A system assurance, not software assurance class)Operation2/3Detect/ReactInt
Tool Integration FrameworksTest/Operation2DetectInt
The following don't have web pages.
Requirements modeling or tracing toolsRequirements1/2DetectInt
Use casesRequirements0DetectInt
Constructive Approaches (Correct by construction)Design/ Implementation1/2PrecludeInt
Compiler, error checkingImplementation3DetectInt
Compiler, safety enforcingImplementation3PrecludeInt
Configuration management (SWEBOK 10 1.6)Config manage0/2PrecludeInt
Test generators, execution frameworks, test evaluation, test management, performance analysis (SWEBOK 10 1.4) Source code or binary fault injection, fault propagation analysis, fuzz testing (Goertzel 4.1.4.4.4-.9)Test1/2DetectInt
Code review assistants (SWEBOK 10 1.9)Test1DetectInt
Operator trainingOperation1PrecludeExt
Firewall, Virtual Patch, or WrapperOperation3MitigateInt
Forensic Security Analysis (Goertzel 4.1.4.4.12)Operation1/2ReactInt
Software engineering management (SWEBOK 10 1.7)SWE manage0/2PrecludeInt
Software engineering process (SWEBOK 10 1.8)SWE process0/2PrecludeInt

Guide to the SWEBOK[8] Chapter 10 lists software engineering methods, divided into three groups.

2.1 Heuristic methods

  • Structured methods
  • Data-oriented methods
  • Object-oriented methods

2.2 Formal methods

  • Specification languages and notations
  • Refinement
  • Verification/proving

2.3 Prototyping methods

  • Prototyping the style
  • Prototyping the target
  • Prototyping evaluation techniques

Insecure.Org's 2006 Top 100 Network Security Tools has several classes of tools mostly for network investigation, including web vulnerability scanners (= Web Application Scanners), vulnerability scanners (= Network Scanners), top 5 intrusion detection systems password crackers, packet sniffers, wireless tools, top 3 vulnerability exploitation tools, top 4 application-specific scanners, top 4 port scanners, top 3 firewalls, top 4 rootkit detectors, and packet crafters. Some tools are not categorized, but just listed in the Top 100.

Created February 3, 2021, Updated May 1, 2026
Was this page helpful?