Reducing software security risk through an integrated approach

被引:1
|
作者
Gilliam, DP [1 ]
Powell, JD [1 ]
Kelly, JC [1 ]
Bishop, M [1 ]
机构
[1] CALTECH, Jet Prop Lab, Pasadena, CA 91125 USA
关键词
security toolset; vulnerability matrix; property-based testing; model checking; security; verification;
D O I
10.1109/SEW.2001.992653
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents joint work by the California Institute of Technology's Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the National Aeronautics and Space Administration Goddard Independent Verification and Validation Facility to develop a security assessment instrument for the software development and maintenance life Cycle. Vulnerabilities in operating systems and software applications render an otherwise secure environment insecure. Any operating system or application added to a secure environment that has exploitable security vulnerabilities affects the security of the whole environment. An otherwise secure system can be compromised easily if the system or application software on it, or on a linked system, has vulnerabilities. Therefore, it is critical that software on networked computer systems be free from security vulnerabilities. Security, vulnerabilities in software arise from a number of development factors; but these vulnerabilities can generally be traced to poor software development practices, new modes of attacks, mis-configurations, and unsecured links between systems. A Software security assessment instrument can aid in providing a greater level of assurance that software is not exposed to vulnerabilities as a result of defective software requirements, designs, code or exposures due to code complexity, and integration with other applications that are network aware. This paper presents research on the generation of a software security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles. The research presented here is available at: http://security.jpl.nasa.gov/rssr.
引用
收藏
页码:36 / 42
页数:7
相关论文
共 50 条
  • [41] An Integrated Approach to Develop Interactive Software
    Losada, Begona
    Urretavizcaya, Maite
    Fernandez de Castro, Isabel
    HUMAN-COMPUTER INTERACTION - INTERACT 2011, PT IV, 2011, 6949 : 470 - 474
  • [42] A software approach to integrated machine vision
    Yardley, E
    COMPUTING & CONTROL ENGINEERING JOURNAL, 2005, 15 (06): : 15 - 18
  • [43] An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the air
    Mayilsamy, Kathiresh
    Ramachandran, Neelaveni
    Raj, Vismitha Sunder
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 71 : 578 - 593
  • [44] A Security Threats Measurement Model for Reducing Cloud Computing Security Risk
    Lai, Sen-Tarng
    Leu, Fang-Yie
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 414 - 419
  • [45] An Adaptive and Diversified Vehicle Routing Approach to Reducing the Security Risk of Cash-in-Transit Operations
    Bozkaya, Burcin
    Salman, F. Sibel
    Telciler, Kaan
    NETWORKS, 2017, 69 (03) : 256 - 269
  • [46] Quantitative Software Security Risk Assessment Model
    Mkpong-Ruffin, Idongesit
    Umphress, David
    Hamilton, John
    Gilbert, Juan
    QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 31 - 33
  • [47] Approach Uses Software Analysis to Improve Security
    不详
    COMPUTER, 2010, 43 (02) : 17 - 18
  • [48] Reducing The Number of Security Vulnerabilities in Web Applications by Improving Software Quality
    Trifonov, Gergely
    SACI: 2009 5TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, 2009, : 41 - 44
  • [49] Reducing the Risks of Communication Failures Through Software Models
    Lopes, Adriana
    Conte, Tayana
    de Souza, Clarisse Sieckenius
    PROCEEDINGS OF THE 18TH BRAZILIAN SYMPOSIUM ON HUMAN FACTORS IN COMPUTING SYSTEMS (IHC 2019), 2019,
  • [50] SETAM: An Integrated Model for Software Security Testing Requirements Behavior
    Hui, Zhanwei
    Huang, Song
    Liu, Xiaoming
    Hu, Bin
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4435 - 4442