Mapping the field of software life cycle security metrics

被引:26
|
作者
Morrison, Patrick [1 ]
Moye, David [1 ]
Pandita, Rahul [1 ,2 ]
Williams, Laurie [1 ]
机构
[1] North Carolina State Univ, Raleigh, NC 27695 USA
[2] Phase Change Software LLC, Golden, CO USA
关键词
Metrics; Measurement; Security;
D O I
10.1016/j.infsof.2018.05.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Practitioners establish a piece of software's security objectives during the software development process. To support control and assessment, practitioners and researchers seek to measure security risks and mitigations during software development projects. Metrics provide one means for assessing whether software security objectives have been achieved. A catalog of security metrics for the software development life cycle could assist practitioners in choosing appropriate metrics, and researchers in identifying opportunities for refinement of security measurement. Objective: The goal of this research is to support practitioner and researcher use of security measurement in the software life cycle by cataloging security metrics presented in the literature, their validation, and the subjects they measure. Method: We conducted a systematic mapping study, beginning with 4818 papers and narrowing down to 71 papers reporting on 324 unique security metrics. For each metric, we identified the subject being measured, how the metric has been validated, and how the metric is used. We categorized the metrics, and give examples of metrics for each category. Results: In our data, 85% of security metrics have been proposed and evaluated solely by their authors, leaving room for replication and confirmation through field studies. Approximately 60% of the metrics have been empirically evaluated, by their authors or by others. The available metrics are weighted heavily toward the implementation and operations phases, with relatively few metrics for requirements, design, and testing phases of software development. Some artifacts and processes remain unmeasured. Measured by phase, Testing received the least attention, with 1.5% of the metrics. Conclusions: At present, the primary application of security metrics to the software development life cycle in the literature is to study the relationship between properties of source code and reported vulnerabilities. The most-cited and most used metric, vulnerability count, has multiple definitions and operationalizations. We suggest that researchers must check vulnerability count definitions when making comparisons between papers. In addition to refining vulnerability measurement, we see research opportunities for greater attention to metrics for the requirement, design, and testing phases of development. We conjecture from our data that the field of software life cycle security metrics has yet to converge on an accepted set of metrics.
引用
收藏
页码:146 / 159
页数:14
相关论文
共 50 条
  • [31] Metrics for Software Reliability: a Systematic Mapping Study
    Ronchieri, E.
    Canaparo, M.
    JOURNAL OF INTEGRATED DESIGN & PROCESS SCIENCE, 2018, 22 (02) : 5 - 25
  • [32] A Review and Catalog of Security Metric during the Secure Software Development Life Cycle
    Sampada, G. C.
    Sake, Tende Ivo
    Prasad, Amrita
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2021, 14 (04) : 398 - 405
  • [33] Security-aware Software Development Life Cycle (SaSDLC) - Processes and Tools
    Talukder, Asoke K.
    Maurya, Vineet Kumar
    Babu, Santhosh G.
    Ebenezer, Jangam
    Sekhar, Muni, V
    Jevitha, K. P.
    Samanta, Saurabh
    Pais, Alwyn Roshan
    WOCN: 2009 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2009, : 253 - 257
  • [34] Software Process Metrics in Agile Software Development: A Systematic Mapping Study
    Hossain, Syeda Sumbul
    Ahmed, Pollab
    Arafat, Yeasir
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT IX, 2021, 12957 : 15 - 26
  • [35] Essential Requirements for Data Security in the Context of Software Metrics
    Sastry, B. R.
    Saradhi, M. V. Vijaya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (01): : 19 - 23
  • [36] Development of iMACOQR Metrics Framework for Quantification of Software Security
    Banerjee, Arpita
    Banerjee, C.
    Pandey, Santosh K.
    Poonia, Ajeet Singh
    PROCEEDINGS OF FIFTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2015), VOL 2, 2016, 437 : 711 - 719
  • [37] Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study
    Alves, Henrique
    Fonseca, Baldoino
    Antunes, Nuno
    2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016), 2016, : 37 - 44
  • [38] A Phase-wise Review of Software Security Metrics
    Ansar, Syed Anas
    Alka
    Khan, Raees Ahmad
    NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 : 15 - 25
  • [39] Environmental Metrics for Software Security Based on a Vulnerability Ontology
    Wang, Ju An
    Guo, Minzhe
    Wang, Hao
    Xia, Min
    Zhou, Linfeng
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 159 - 168
  • [40] A Security Metrics Development Method for Software Intensive Systems
    Savola, Reijo M.
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 11 - 16