A Software Security Optimization Architecture (SoSOA) and Its Adaptation for Mobile Applications

被引:0
|
作者
Abozeid A. [1 ,2 ]
AlHabshy A.A. [2 ]
ElDahshan K. [2 ]
机构
[1] Jouf University, Jouf
[2] Al-Azhar University, Cairo
关键词
Reverse engineering; Security architecture; Security optimization; Software protection; Source code protection;
D O I
10.3991/ijim.v15i11.20133
中图分类号
学科分类号
摘要
Security attacks become daily news due to an exposure of a security threat in a widely used software. Taking software security into consideration during the analysis, design, and implementation phases is a must. A software application should be protected against any security threat such as unauthorized distribution or code retrieval. Due to the lack of applying a software security standard architecture, developers may create software that may be vulnerable to many types of security threats. This paper begins by reviewing different types of known software security threats and their countermeasure mechanisms. Then, it proposes a new security optimization architecture for software applications. This architecture is a step towards establishing a standard to guarantee the software’s security. Furthermore, it proposes an adapted software security optimization architecture for mobile applications. Besides, it presents an algorithmic implementation of the newly proposed architecture, then it proves its security. Moreover, it builds a secure mobile application based on the newly proposed architecture. © 2021
引用
收藏
页码:148 / 165
页数:17
相关论文
共 50 条
  • [11] An architecture for autonomic security adaptation
    Klenk, Andreas
    Niedermayer, Heiko
    Masekowsky, Marcus
    Carle, Georg
    ANNALS OF TELECOMMUNICATIONS, 2006, 61 (9-10) : 1066 - 1082
  • [12] Security Architecture for Mobile E-Health Applications in Medication Control
    Goncalves, Fabio
    Macedo, Joaquim
    Joao Nicolau, M.
    Santos, Alexandre
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 300 - 307
  • [13] A SOFTWARE REFERENCE ARCHITECTURE FOR THE DESIGN AND DEVELOPMENT OF MOBILE WORKFLOW LEARNING APPLICATIONS
    Castelan, E.
    Brigos, M. A.
    Fernandez, J.
    INTED2014: 8TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2014, : 6351 - 6360
  • [14] TRANSITION AND ADAPTATION IN MOBILE ARCHITECTURE
    GOULD, EB
    ANTIQUES, 1977, 112 (03): : 466 - 475
  • [15] SOFTWARE ARCHITECTURE FOR MOBILE ENVIRONMENTS
    Zapata Granada, Einer
    Sepulveda Rodriguez, Luis Eduardo
    Gomez Montoya, Carlos Eduardo
    Candela Uribe, Christian Andres
    REVISTA DE INVESTIGACIONES-UNIVERSIDAD DEL QUINDIO, 2014, 25 (01): : 20 - 27
  • [16] Design of Mobile Software Architecture
    Tak, Ji-Uoo
    Lee, Roger Y.
    Kim, Haeng-Kon
    SOFTWARE AND NETWORK ENGINEERING, 2012, 413 : 133 - +
  • [17] Software Architecture of a Mobile Robot
    Muzaffar, Abdul Wahab
    Mir, Shumyla Rasheed
    Latif, Muhammad
    Butt, Wasi Haider
    Azam, Farooque
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2015, : 102 - 107
  • [18] Software architecture for mobile computing
    Murphy, AL
    Picco, GP
    Roman, GC
    FORMAL METHODS FOR SOFTWARE ARCHITECTURES, 2003, 2804 : 182 - 206
  • [19] Software architecture exploration for high-performance security processing on a multiprocessor mobile SoC
    Arora, Divya
    Raghunathan, Anand
    Ravi, Srivaths
    Sankaradass, Murugan
    Jha, Niraj K.
    Chakradhar, Srimat T.
    43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006, 2006, : 496 - +
  • [20] Provable cryptographic security and its applications to mobile wireless computing
    Gentry, C
    Ramzan, Z
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 191 - 203