Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model

被引:0
|
作者
Hussain, Shariq [1 ]
Anwaar, Haris [2 ]
Sultan, Kashif [3 ]
Mahmud, Umar [1 ]
Farooqui, Sherjeel [1 ]
Karamat, Tehmina [1 ]
Toure, Ibrahima Kalil [4 ]
机构
[1] Fdn Univ Islamabad FUI, Dept Software Engn, Islamabad, Pakistan
[2] Univ Engn & Technol, Dept Elect Elect & Telecommun Engn, Lahore, Pakistan
[3] Bahria Univ Islamabad, Dept Software Engn, Islamabad, Pakistan
[4] Gamal Abdel Nasser Univ, Dept Comp Sci, Conakry, Guinea
来源
JOURNAL OF ENGINEERING | 2024年 / 2024卷
关键词
US; MISUSE; REST;
D O I
10.1155/2024/9962691
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
For the past few years, software security has become a pressing issue that needs to be addressed during software development. In practice, software security is considered after the deployment of software rather than considered as an initial requirement. This delayed action leads to security vulnerabilities that can be catered for during the early stages of the software development life cycle (SDLC). To safeguard a software product from security vulnerabilities, security must be given equal importance with functional requirements during all phases of SDLC. In this paper, we propose a policy-driven waterfall model (PDWM) for secure software development describing key points related to security aspects in the software development process. The security requirements are the security policies that are considered during all phases of waterfall-based SDLC. A framework of PDWM is presented and applied to the e-travel scenario to ascertain its effectiveness. This scenario is a case of small to medium-sized software development project. The results of case study show that PDWM can identify 33% more security vulnerabilities as compared to other secure software development techniques.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] The practice of secure software development in SDLC: an investigation through existing model and a case study
    Karim, Nor Shahriza Abdul
    Albuolayan, Arwa
    Saba, Tanzila
    Rehman, Amjad
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5333 - 5345
  • [32] Policy-driven ecosystems for new vaccine development
    Li, Julia Fan
    Garnsey, Elizabeth
    [J]. TECHNOVATION, 2014, 34 (12) : 762 - 772
  • [33] Secure software - Development by example
    Apvrille, A
    Pourzandi, M
    [J]. IEEE SECURITY & PRIVACY, 2005, 3 (04) : 10 - 17
  • [34] “A framework for development of secure software”
    Kakali Chatterjee
    Daya Gupta
    Asok De
    [J]. CSI Transactions on ICT, 2013, 1 (2) : 143 - 157
  • [35] Managing the Secure Software Development
    Fujdiak, Radek
    Mlynek, Petr
    Mrnustik, Pavel
    Barabas, Maros
    Blazek, Petr
    Borcik, Filip
    Misurec, Jiri
    [J]. 2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [36] On the Emulation of Vulnerabilities through Software Fault Injection
    Cerveira, Frederico
    Barbosa, Raul
    Mercier, Marta
    Madeira, Henrique
    [J]. 2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017), 2017, : 73 - 78
  • [37] Improving The Efficiency Of Software Development Through Software Augmentation Isochronism Model
    Sainath, P.
    Reddy, Kishor Kumar C.
    Syed, Osman Ali
    Venugopal, S.
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 877 - 882
  • [38] A flexible policy-driven trust negotiation model
    De Coi, Juri L.
    Olmedilla, Daniel
    [J]. PROCEEDINGS OF THE IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT TECHNOLOGY (IAT 2007), 2007, : 450 - +
  • [39] Mitigating postharvest losses: A policy-driven approach to empowering smallholder farmers in Tanzania
    Bisheko, Muganyizi J.
    Rejikumar, G.
    [J]. SCIENTIFIC AFRICAN, 2024, 23
  • [40] An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development
    Palombo, Hernan
    Tabari, Armin Ziaie
    Lende, Daniel
    Ligatti, Jay
    Ou, Xinming
    [J]. PROCEEDINGS OF THE SIXTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2020), 2020, : 205 - 220