Creating and Using Secure Software

被引:0
|
作者
Asadoorian, Adam [1 ]
Alberto, Melvin [1 ]
Ali, Md Liakat [1 ]
机构
[1] Rider Univ, Dept Comp Sci & Phys, Lawrenceville, NJ 08648 USA
关键词
security; software specification; implementation; planning; testing; evolution; graphical authentication; obfuscation; random numbers; AUTHENTICATION;
D O I
10.1109/uemcon51285.2020.9298046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we outline the Software Development LifeCycle (SDLC: requirements elicitation & definition, design, implementation, testing, and maintenance) and seek to find and convey the best practices for security throughout the it. Security should be made a priority when defining system requirements; system design and architecture should embody those requirements through secure models (supporting integrity, confidentiality, authorization); developers should translate those specifications to the code; proper test cases should be devised in order to assess possible vulnerabilities of completed systems; maintenance and evolution teams should be cognizant of previous security measures to avoid compromising them with functional improvements. Further, there are measures that should be taken outside of and after the completion of this cycle to reduce the risk of successful attacks both in terms of securing data and in terms of compounding the difficulty of reverse engineering. Methods include new approaches to authentication, the old standby of cryptography, and obfuscating source code so that exploiting it will be difficult. Employing all of these strategies in tandem should produce secure yet functional systems with security present in all layers; the more barriers that stand in an attacker's way, the less often an attack will be attempted and those increases the reactionary time that system administrators have to respond to attacks in progress.
引用
收藏
页码:786 / 792
页数:7
相关论文
共 50 条
  • [31] Creating a safe and secure network society using digital certificates and PKI technology
    Masamoto, Hiroshi
    Yoshida, Yoshihiro
    Hashimoto, Shoichi
    Otsubo, Rie
    Nakajima, Yoshiaki
    NTT Technical Review, 2008, 6 (03):
  • [32] A Case-based Management System for Secure Software Development Using Software Security Knowledge
    Saito, Masahito
    Hazeyama, Atsuo
    Yoshioka, Nobukazu
    Kobashi, Takanori
    Washizaki, Hironori
    Kaiya, Haruhiko
    Ohkubo, Takao
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 1092 - 1100
  • [33] Design of a secure software download algorithm in Software Defined Radio Terminals using quantum cryptography
    Mahimkar, A
    2002 4TH INTERNATIONAL WORKSHOP ON MOBILE AND WIRELESS COMMUNICATION NETWORK, 2002, : 641 - 645
  • [34] A Way for Creating and Using a Theory of a Project in Designing of a Software Intensive System
    Sosnin, P.
    PROCEEDINGS OF THE 2017 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2017), 2017,
  • [35] Creating Virtual Stores Using Software Product Lines: An Application Case
    Rincon, Luisa
    Rodriguez, Gabriel
    Martinez, Juan C.
    Ines Alvarez, Gloria
    Constanza Pabon, Maria
    2015 10TH COMPUTING COLOMBIAN CONFERENCE (10CCC), 2015, : 128 - 135
  • [36] Teaching secure software engineering: Writing secure code
    Yu, Huiming
    Jones, Nadia
    Bullock, Gina
    Yuan, Xiaohong Yuan
    2011 7th Central and Eastern European Software Engineering Conference, CEE-SECR 2011, 2011,
  • [37] Secure Software Architectural Patterns Designed with Secure Connectors
    Shin, Michael
    Kang, Taeghyun
    Gomaa, Hassan
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2022, : 484 - 491
  • [38] Secure software systems engineering: The secure Tropos approach
    Mouratidis H.
    Journal of Software, 2011, 6 (03) : 331 - 339
  • [39] Improving secure coding rules for automotive software by using a vulnerability database
    Kurachi, Ryo
    Takada, Hiroaki
    Tanabe, Masato
    Anzai, Jun
    Takei, Kentaro
    Iinuma, Takaaki
    Maeda, Manabu
    Matsushima, Hideki
    2018 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES 2018), 2018,
  • [40] Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept
    Steger, Marco
    Dorri, Ali
    Kanhere, Salil S.
    Roemer, Kay
    Jurdak, Raja
    Karner, Michael
    ADVANCED MICROSYSTEMS FOR AUTOMOTIVE APPLICATIONS 2017: SMART SYSTEMS TRANSFORMING THE AUTOMOBILE, 2018, : 137 - 149