Software Security Vulnerabilities Seen As Feature Interactions

被引:0
|
作者
Jourdan, Guy-Vincent [1 ]
机构
[1] Univ Ottawa, Sch Informat Technol & Engn, Ottawa, ON, Canada
关键词
Software security; interactions; injections; software vulnerabilities;
D O I
10.3233/978-1-60750-014-8-149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level practical solutions. In this paper, we look at a subset of the "security" field: the production of secure, general purpose software from a software engineering viewpoint. We call this simply "software security". We show that, when we analyze this particular subset of the field, many if not most problems turn out to be instances of feature interactions problems. We illustrate our claim by looking at three of the top ten most common vulnerabilities in Web application as published by OWASP (the three that are in fact software security issues) and show that in each instance, we can express the problem as a feature interactions problem. We also reach the same conclusion with one of the latest generalized software security vulnerability, "ClickJacking".
引用
收藏
页码:149 / 159
页数:11
相关论文
共 50 条
  • [1] Labeling Software Security Vulnerabilities
    Bojanova, Irena
    Guerrerio, John J.
    [J]. IT PROFESSIONAL, 2023, 25 (05) : 64 - 70
  • [2] Software Metrics as Indicators of Security Vulnerabilities
    Medeiros, Nadia
    Ivaki, Naghmeh
    Costa, Pedro
    Vieira, Marco
    [J]. 2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 216 - 227
  • [3] The Research on Software Security Vulnerabilities Mining
    Liu Shuyu
    Kong Weiguang
    Yang Diwei
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT AND INNOVATION (TMI 2010), 2010, : 333 - 335
  • [4] On the Detection and Analysis of Software Security Vulnerabilities
    Wijesiriwardana, Chaman
    Wimalaratne, Prasad
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [5] Software Security Vulnerabilities: Baselining and Benchmarking
    Rotella, Pete
    [J]. 2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SECURITY AWARENESS FROM DESIGN TO DEPLOYMENT (SEAD), 2018, : 3 - 10
  • [6] A Study of Security Vulnerabilities and Software Weaknesses in Vehicles
    Xiong, Wenjun
    Gulsever, Melek
    Kaya, Koray Mustafa
    Lagerstrom, Robert
    [J]. SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 204 - 218
  • [7] Mapping Software Faults with Web Security Vulnerabilities
    Fonseca, Jose
    Vieira, Marco
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 257 - +
  • [8] Vulnerabilities and Threats in Cloud Software Engineering Security
    Yu, Weider D.
    Runiassy, Maryam
    Yin, Yijun
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1822 - 1831
  • [9] Model checking security vulnerabilities in software design
    Li Jinhua
    Li Jing
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [10] Security vulnerabilities in software systems: A quantitative perspective
    Alhazmi, O
    Malaiya, Y
    Ray, I
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 281 - 294