Creating and Using Secure Software

被引:0
|
作者
Asadoorian, Adam [1 ]
Alberto, Melvin [1 ]
Ali, Md Liakat [1 ]
机构
[1] Rider Univ, Dept Comp Sci & Phys, Lawrenceville, NJ 08648 USA
关键词
security; software specification; implementation; planning; testing; evolution; graphical authentication; obfuscation; random numbers; AUTHENTICATION;
D O I
10.1109/uemcon51285.2020.9298046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we outline the Software Development LifeCycle (SDLC: requirements elicitation & definition, design, implementation, testing, and maintenance) and seek to find and convey the best practices for security throughout the it. Security should be made a priority when defining system requirements; system design and architecture should embody those requirements through secure models (supporting integrity, confidentiality, authorization); developers should translate those specifications to the code; proper test cases should be devised in order to assess possible vulnerabilities of completed systems; maintenance and evolution teams should be cognizant of previous security measures to avoid compromising them with functional improvements. Further, there are measures that should be taken outside of and after the completion of this cycle to reduce the risk of successful attacks both in terms of securing data and in terms of compounding the difficulty of reverse engineering. Methods include new approaches to authentication, the old standby of cryptography, and obfuscating source code so that exploiting it will be difficult. Employing all of these strategies in tandem should produce secure yet functional systems with security present in all layers; the more barriers that stand in an attacker's way, the less often an attack will be attempted and those increases the reactionary time that system administrators have to respond to attacks in progress.
引用
收藏
页码:786 / 792
页数:7
相关论文
共 50 条
  • [1] Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
    Nilsson, Dennis K.
    Larson, Ulf E.
    Jonsson, Erland
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 : 207 - 220
  • [2] Creating software with software
    Armour, P
    IEEE SOFTWARE, 2005, 22 (02) : 10 - 10
  • [3] Creating Secure Wireless Regions using Configurable Beamforming
    Zhang, Yuanrui
    Marshall, Alan
    Woods, Roger
    Ko, Youngwook
    2014 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATION (PIMRC), 2014, : 47 - 52
  • [4] Using Security Policies to Write Secure Software
    Myers, Andrew C.
    LOGICS AND LANGUAGES FOR RELIABILITY AND SECURITY, 2010, 25 : 225 - 261
  • [5] Secure Software
    McGregor, John D.
    JOURNAL OF OBJECT TECHNOLOGY, 2005, 4 (04): : 33 - 42
  • [6] Creating scatterplot matrices using SAS/GRAPH® software
    Vierkant, RA
    PROCEEDINGS OF THE TWENTY-THIRD ANNUAL SAS USERS GROUP INTERNATIONAL CONFERENCE, 1998, : 821 - 826
  • [7] Creating compact models using standard spreadsheet software
    Noebauer, G
    SEVENTEENTH ANNUAL IEEE SEMICONDUCTOR THERMAL MEASUREMENT AND MANAGEMENT SYMPOSIUM, PROCEEDINGS 2001, 2001, : 126 - 133
  • [8] Software Architecture of a Secure Multimedia System Using a Multicore SoC and Software Virtualization
    Kondol, Hiroyuki
    Yamamoto, Osamu
    Otani, Sugako
    Sugai, Naoto
    Shimizu, Toru
    2009 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2009, : 217 - +
  • [9] Case Base for Secure Software Development Using Software Security Knowledge Base
    Hazeyama, Atsuo
    Saito, Masahito
    Yoshioka, Nobukazu
    Kumagai, Azusa
    Kobashi, Takanori
    Washizaki, Hironori
    Kaiya, Haruhiko
    Okubo, Takao
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 97 - 103