The Use of Security Tactics in Open Source Software Projects

被引:11
|
作者
Ryoo, Jungwoo [1 ]
Malone, Bryan [2 ]
Laplante, Phillip A. [1 ]
Anand, Priya [1 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
[2] Colorado Tech Univ, Colorado Springs, CO 80907 USA
关键词
Open source software; security tactics; software architecture;
D O I
10.1109/TR.2015.2500367
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the best intentions of software architects, it is often the case that individual developers do not faithfully implement the original security design decisions. Such a scenario sometimes leads to a situation in which while an architect claims the use of a secure architecture in the form of some tactic, the corresponding source code does not support the claim. To bridge this gap, the first critical step is to verify whether the source code reflects at least some of the structural or behavioral features required for a tactic. In this study, we examine the extent of this discrepancy between an architect's vision of what security tactics need to be adopted in the software and the actual implementation. We accomplish this research goal by 1) exploring an architect's intention to use security tactics, 2) checking whether the tactic is manifested in the design, and finally 3) recovering the evidence of efforts to implement the design in the source code. To avoid limitations to accessing documentation and source code, we use open source projects to conduct our research.
引用
收藏
页码:1195 / 1204
页数:10
相关论文
共 50 条
  • [1] Data on security requirements in open-source software projects
    Wang, Wentao
    Mahakala, Kavya Reddy
    Gupta, Arushi
    Hussein, Nesrin
    Wang, Yinglin
    [J]. DATA IN BRIEF, 2019, 25
  • [2] On the security of open source software
    Payne, C
    [J]. INFORMATION SYSTEMS JOURNAL, 2002, 12 (01) : 61 - 78
  • [3] Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
    Wermke, Dominik
    Woehler, Noah
    Klemmer, Jan H.
    Fourne, Marcel
    Acar, Yasemin
    Fahl, Sascha
    [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1880 - 1896
  • [4] Security Issues Surrounding the Use of Open Source Software by Online Students
    Tubilleja, Jose Rene
    [J]. 2015 12TH INTERNATIONAL CONFERENCE & EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2015,
  • [5] Analysing the Reliability of Open Source Software Projects
    Aversano, Lerina
    Tortorella, Maria
    [J]. 2015 10TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), VOL 1, 2015, : 348 - 357
  • [6] RESOURCE ALLOCATION IN OPEN SOURCE SOFTWARE PROJECTS
    Georgescu, Mihai
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2013, : 437 - 441
  • [7] CONTINUOUS INTEGRATION IN OPEN SOURCE SOFTWARE PROJECTS
    Georgescu, Mihai
    Cioloca, Cecilia
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2015): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2015, : 244 - 249
  • [8] Maintenance Support in Open Source Software Projects
    Raza, Arif
    Capretz, Luiz Fernando
    Ahmed, Faheem
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2013, : 391 - 395
  • [9] The Governance and Control of Open Source Software Projects
    Di Tullio, Dany
    Staples, D. Sandy
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2013, 30 (03) : 49 - 80
  • [10] Exploring the Use of Labels to Categorize Issues in Open-Source Software Projects
    Cabot, Jordi
    Luis, Javier
    Izquierdo, Canovas
    Cosentino, Valerio
    Rolandi, Belen
    [J]. 2015 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), 2015, : 550 - 554