Creating and Using Secure Software

被引:0
|
作者
Asadoorian, Adam [1 ]
Alberto, Melvin [1 ]
Ali, Md Liakat [1 ]
机构
[1] Rider Univ, Dept Comp Sci & Phys, Lawrenceville, NJ 08648 USA
关键词
security; software specification; implementation; planning; testing; evolution; graphical authentication; obfuscation; random numbers; AUTHENTICATION;
D O I
10.1109/uemcon51285.2020.9298046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we outline the Software Development LifeCycle (SDLC: requirements elicitation & definition, design, implementation, testing, and maintenance) and seek to find and convey the best practices for security throughout the it. Security should be made a priority when defining system requirements; system design and architecture should embody those requirements through secure models (supporting integrity, confidentiality, authorization); developers should translate those specifications to the code; proper test cases should be devised in order to assess possible vulnerabilities of completed systems; maintenance and evolution teams should be cognizant of previous security measures to avoid compromising them with functional improvements. Further, there are measures that should be taken outside of and after the completion of this cycle to reduce the risk of successful attacks both in terms of securing data and in terms of compounding the difficulty of reverse engineering. Methods include new approaches to authentication, the old standby of cryptography, and obfuscating source code so that exploiting it will be difficult. Employing all of these strategies in tandem should produce secure yet functional systems with security present in all layers; the more barriers that stand in an attacker's way, the less often an attack will be attempted and those increases the reactionary time that system administrators have to respond to attacks in progress.
引用
收藏
页码:786 / 792
页数:7
相关论文
共 50 条
  • [21] Creating a portable programming language using open source software
    Bauer, A
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK 2004 USENIX ANNUAL TECHNICAL CONFERENCE, 2004, : 103 - 113
  • [22] Secure software architectures
    Moriconi, M
    Qian, XL
    Riemenschneider, RA
    Gong, L
    1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 84 - 93
  • [23] What is secure software?
    Ehrenberger, W.
    IT - Information Technology, 1983, 25 (01): : 27 - 32
  • [24] Secure Software Flashing
    Weimerskirch, Andre
    SAE INTERNATIONAL JOURNAL OF PASSENGER CARS-ELECTRONIC AND ELECTRICAL SYSTEMS, 2009, 2 (01): : 83 - 86
  • [25] Design of Secure Software Architectures with Secure Connectors
    Shin, Michael E.
    Gomaa, Hassan
    Pathirage, Don
    Baker, Chase
    Malhotra, Bhavya
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2016, 26 (05) : 769 - 805
  • [26] Secure spiral: A secure software development model
    Kaur, P., 1600, Academic Journals Inc., 244, 5th avenue, No. 2218, New City, NY 10001, United States (06):
  • [27] FAS: Using FPGA to Accelerate and Secure SDN Software Switches
    Fu, Wenwen
    Li, Tao
    Sun, Zhigang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [28] Designing Secure Architecture of Health Software using Agile Practices
    Pirker, Alexander
    Lechner, Nadica Hrgarek
    CENTRAL EUROPEAN CONFERENCE ON INFORMATION AND INTELLIGENT SYSTEMS (CECIIS 2019), 2019, : 269 - 280
  • [29] Reusable Secure Connectors for Secure Software Architecture
    Shin, Michael
    Gomaa, Hassan
    Pathirage, Don
    SOFTWARE REUSE: BRIDGING WITH SOCIAL-AWARENESS, 2016, 9679 : 181 - 196
  • [30] Conditions for creating perfectly secure systems
    Styugin, M.
    XII INTERNATIONAL SCIENTIFIC AND RESEARCH CONFERENCE TOPICAL ISSUES IN AERONAUTICS AND ASTRONAUTICS, 2016, 155