Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model

被引:0
|
作者
Hussain, Shariq [1 ]
Anwaar, Haris [2 ]
Sultan, Kashif [3 ]
Mahmud, Umar [1 ]
Farooqui, Sherjeel [1 ]
Karamat, Tehmina [1 ]
Toure, Ibrahima Kalil [4 ]
机构
[1] Fdn Univ Islamabad FUI, Dept Software Engn, Islamabad, Pakistan
[2] Univ Engn & Technol, Dept Elect Elect & Telecommun Engn, Lahore, Pakistan
[3] Bahria Univ Islamabad, Dept Software Engn, Islamabad, Pakistan
[4] Gamal Abdel Nasser Univ, Dept Comp Sci, Conakry, Guinea
来源
JOURNAL OF ENGINEERING | 2024年 / 2024卷
关键词
US; MISUSE; REST;
D O I
10.1155/2024/9962691
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
For the past few years, software security has become a pressing issue that needs to be addressed during software development. In practice, software security is considered after the deployment of software rather than considered as an initial requirement. This delayed action leads to security vulnerabilities that can be catered for during the early stages of the software development life cycle (SDLC). To safeguard a software product from security vulnerabilities, security must be given equal importance with functional requirements during all phases of SDLC. In this paper, we propose a policy-driven waterfall model (PDWM) for secure software development describing key points related to security aspects in the software development process. The security requirements are the security policies that are considered during all phases of waterfall-based SDLC. A framework of PDWM is presented and applied to the e-travel scenario to ascertain its effectiveness. This scenario is a case of small to medium-sized software development project. The results of case study show that PDWM can identify 33% more security vulnerabilities as compared to other secure software development techniques.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Policy-driven licensing model for component software
    Zhao, Q
    Zhou, Y
    Perry, M
    [J]. IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 219 - 228
  • [2] Software metrics for policy-driven software development life cycle automation
    Borodaev, Leonid
    Smedinga, Rein
    Telea, Alex
    Groenboom, Rix
    [J]. 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2018, : 169 - 174
  • [3] Secure Feature Driven Development (SFDD) Model for Secure Software Development
    Firdaus, Adila
    Ghani, Imran
    Jeong, Seung Ryul
    [J]. 2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 : 546 - 553
  • [4] A policy-driven approach for software-as-services customization
    Zhang, Kuo
    Zhang, Xin
    Sun, Wei
    Liang, Haiqi
    Huang, Ying
    Zeng, Liangzhao
    Liu, Xuanzhe
    [J]. 9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 123 - 130
  • [5] Simulating the Software Development Lifecycle: The Waterfall Model
    Saravanos, Antonios
    Curinga, Matthew X.
    [J]. APPLIED SYSTEM INNOVATION, 2023, 6 (06)
  • [6] Secure Software Development Model: A Guide for Secure Software Life Cycle
    Daud, Malik Imran
    [J]. INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 724 - 728
  • [7] Software Defined Membrane: Policy-Driven Edge and Internet of Things Security
    Villari, Massimo
    Fazio, Maria
    Dustdar, Schahram
    Rana, Omer
    Chen, Lydia
    Ranjan, Rajiv
    [J]. IEEE CLOUD COMPUTING, 2017, 4 (04): : 92 - 99
  • [8] ENACTING THE WATERFALL SOFTWARE DEVELOPMENT MODEL USING VRPML
    Zamli, Kamal Zuhairi
    Mat-Isa, Nor Ashidi
    [J]. JURNAL TEKNOLOGI, 2005, 43
  • [9] Developing secure software -: A survey and classification of common software vulnerabilities
    Piessens, F
    De Decker, B
    De Win, B
    [J]. INTEGRITY, INTERNAL CONTROL AND SECURITY IN INFORMATION SYSTEMS: CONNECTING GOVERNANCE AND TECHNOLOGY, 2002, 83 : 27 - 40
  • [10] Cybersecurity Through Secure Software Development
    Josang, Audun
    Odegaard, Marte
    Oftedal, Erlend
    [J]. INFORMATION SECURITY EDUCATION ACROSS THE CURRICULUM, WISE 9, 2015, 453 : 53 - 63