Creating and Using Secure Software

被引:0
|
作者
Asadoorian, Adam [1 ]
Alberto, Melvin [1 ]
Ali, Md Liakat [1 ]
机构
[1] Rider Univ, Dept Comp Sci & Phys, Lawrenceville, NJ 08648 USA
关键词
security; software specification; implementation; planning; testing; evolution; graphical authentication; obfuscation; random numbers; AUTHENTICATION;
D O I
10.1109/uemcon51285.2020.9298046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we outline the Software Development LifeCycle (SDLC: requirements elicitation & definition, design, implementation, testing, and maintenance) and seek to find and convey the best practices for security throughout the it. Security should be made a priority when defining system requirements; system design and architecture should embody those requirements through secure models (supporting integrity, confidentiality, authorization); developers should translate those specifications to the code; proper test cases should be devised in order to assess possible vulnerabilities of completed systems; maintenance and evolution teams should be cognizant of previous security measures to avoid compromising them with functional improvements. Further, there are measures that should be taken outside of and after the completion of this cycle to reduce the risk of successful attacks both in terms of securing data and in terms of compounding the difficulty of reverse engineering. Methods include new approaches to authentication, the old standby of cryptography, and obfuscating source code so that exploiting it will be difficult. Employing all of these strategies in tandem should produce secure yet functional systems with security present in all layers; the more barriers that stand in an attacker's way, the less often an attack will be attempted and those increases the reactionary time that system administrators have to respond to attacks in progress.
引用
收藏
页码:786 / 792
页数:7
相关论文
共 50 条
  • [41] Literature Review of the Challenges of Developing Secure Software Using the Agile Approach
    Oueslati, Hela
    Rahman, Mohammad Masudur
    ben Othmane, Lotfi
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 540 - 547
  • [42] Making safe software secure
    Nordland, Odd
    IMPROVEMENTS IN SYSTEM SAFETY, 2008, : 15 - 23
  • [43] Reliably secure software systems
    Mantel, Heiko
    IT-INFORMATION TECHNOLOGY, 2014, 56 (06): : 265 - 266
  • [45] Secure the perimeter via software
    Automatic I.D. News, 1998, 14 (06):
  • [46] Developing Secure Messaging Software using Post-Quantum Cryptography
    Nguyen, Tat-Thang
    Luc, Nhu-Quynh
    Dao, Toan Thanh
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2023, 13 (06) : 12440 - 12445
  • [47] Secure Dynamic Software Loading and Execution using Cross Component Verification
    Min, Byungho
    Varadharajan, Vijay
    2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 113 - 124
  • [48] The art of creating reliable software-based systems using off-the-shelf software components
    Green, PA
    SIXTEENTH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1997, : 118 - 120
  • [49] Secure software - Development by example
    Apvrille, A
    Pourzandi, M
    IEEE SECURITY & PRIVACY, 2005, 3 (04) : 10 - 17
  • [50] An approach for secure software installation
    Venkatakrishnan, VN
    Sekar, R
    Kamat, T
    Tsipa, S
    Liang, Z
    USENIX ASSOCIATION PROCEEDINGS OF THE SIXTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XVI), 2002, : 219 - 226