A Software Security Optimization Architecture (SoSOA) and Its Adaptation for Mobile Applications

被引:0
|
作者
Abozeid A. [1 ,2 ]
AlHabshy A.A. [2 ]
ElDahshan K. [2 ]
机构
[1] Jouf University, Jouf
[2] Al-Azhar University, Cairo
关键词
Reverse engineering; Security architecture; Security optimization; Software protection; Source code protection;
D O I
10.3991/ijim.v15i11.20133
中图分类号
学科分类号
摘要
Security attacks become daily news due to an exposure of a security threat in a widely used software. Taking software security into consideration during the analysis, design, and implementation phases is a must. A software application should be protected against any security threat such as unauthorized distribution or code retrieval. Due to the lack of applying a software security standard architecture, developers may create software that may be vulnerable to many types of security threats. This paper begins by reviewing different types of known software security threats and their countermeasure mechanisms. Then, it proposes a new security optimization architecture for software applications. This architecture is a step towards establishing a standard to guarantee the software’s security. Furthermore, it proposes an adapted software security optimization architecture for mobile applications. Besides, it presents an algorithmic implementation of the newly proposed architecture, then it proves its security. Moreover, it builds a secure mobile application based on the newly proposed architecture. © 2021
引用
收藏
页码:148 / 165
页数:17
相关论文
共 50 条
  • [31] A new security architecture for mobile communication
    Chen Tianzhou
    Huang Yu
    Chen Feng
    Hu Wei
    PROCEEDINGS OF THE 17TH IASTED INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, 2006, : 424 - +
  • [32] Software Architecture for Swarm Mobile Robots
    Vain, J.
    Tammet, T.
    Kuusik, A.
    Reilent, E.
    BEC 2008: 2008 INTERNATIONAL BIENNIAL BALTIC ELECTRONICS CONFERENCE, PROCEEDINGS, 2008, : 231 - 234
  • [33] A Mobile-agent Security Architecture
    Lin, DeShu
    Huang, TingLei
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 477 - 480
  • [34] An extensible software architecture for mobile components
    Johansen, D
    Lauvset, KJ
    Marzullo, K
    NINTH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2002, : 231 - 237
  • [35] Software architecture for mobile distributed computing
    Issarny, V
    Tartanoglu, F
    Liu, JS
    Sailhan, F
    FOURTH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA 2004), PROCEEDINGS, 2004, : 201 - 210
  • [36] The architecture and security of a mobile communication agent
    Ge, Jinming
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 125 - 129
  • [37] A Simple Security Architecture for Mobile Office
    Kim, Seungcheon
    Jin, Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 139 - 145
  • [38] Context-Aware Adaptation of Mobile Applications Driven By Software Quality and User Satisfaction
    Abusair, Mai
    Di Marco, Antinisca
    Inverardi, Paola
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 31 - 38
  • [39] Security for Mobile ATE Applications
    Moran, Susan
    2012 IEEE AUTOTESTCON PROCEEDINGS, 2012, : 204 - 208
  • [40] Security of Mobile Banking Applications
    Szczepanik, Michal
    Jozwiak, Ireneusz
    ADVANCED SOLUTIONS IN DIAGNOSTICS AND FAULT TOLERANT CONTROL, 2018, 635 : 412 - 419