Threat analysis in the software development lifecycle

被引:5
|
作者
Whitmore, J. [1 ]
Tuerpe, S. [2 ]
Triller, S. [2 ]
Poller, A. [2 ]
Carlson, C. [3 ]
机构
[1] IBM Software Grp, Mechanicsburg, PA 17011 USA
[2] Fraunhofer Inst Secure Informat Technol, Secur Test Lab, D-64295 Darmstadt, Germany
[3] IBM Software Grp, Minneapolis, MN 55402 USA
关键词
Assurance requirements - Current limitation - Development practices - Practical method - Security experts - Small community - Software assets - Software development life cycle;
D O I
10.1147/JRD.2013.2288060
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Businesses and governments that deploy and operate IT (information technology) systems continue to seek assurance that software they procure has the security characteristics they expect. The criteria used to evaluate the security of software are expanding from static sets of functional and assurance requirements to complex sets of evidence related to development practices for design, coding, testing, and support, plus consideration of security in the supply chain. To meet these evolving expectations, creators of software are faced with the challenge of consistently and continuously applying the most current knowledge about risks, threats, and weaknesses to their existing and new software assets. Yet the practice of threat analysis remains an art form that is highly subjective and reserved for a small community of security experts. This paper reviews the findings of an IBM-sponsored project with the Fraunhofer Institute for Secure Information Technology (SIT) and the Technische Universitat Darmstadt. This project investigated aspects of security in software development, including practical methods for threat analysis. The project also examined existing methods and tools, assessing their efficacy for software development within an open-source software supply chain. These efforts yielded valuable insights plus an automated tool and knowledge base that has the potential for overcoming some of the current limitations of secure development on a large scale.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] SOFTWARE-LIFECYCLE AND SOFTWARE PROCESS MODELS
    SCHULZ, A
    [J]. ANGEWANDTE INFORMATIK, 1989, (04): : 137 - 142
  • [42] Adopting threat modelling in agile software development projects
    Bernsmed, Karin
    Cruzes, Daniela Soares
    Jaatun, Martin Gilje
    Iovan, Monica
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 183
  • [43] An Assessment of Software Lifecycle Energy
    Moshnyaga, Vasily G.
    [J]. 2013 23RD INTERNATIONAL WORKSHOP ON POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION (PATMOS), 2013, : 112 - 119
  • [44] Exception handling in the software lifecycle
    De Lemos, R.
    Romanovsky, A.
    [J]. 2001, CRL Publishing (16):
  • [45] Cloud-Based Software Development Lifecycle: A Simplified Algorithm for Cloud Service Provider Evaluation with Metric Analysis
    Santhosh, S.
    Ramaiah, Narayana Swamy
    [J]. BIG DATA MINING AND ANALYTICS, 2023, 6 (02) : 127 - 138
  • [46] Automation in Complex Software Systems Lifecycle for "ISTINA" Data Analysis System
    Vasenin, Valery
    Zanchurin, Maxim
    Zenzinov, Andrey
    Korshunov, Andrey
    Krivchikov, Maxim
    Roganov, Vladimir
    Shachnev, Dmitry
    [J]. 2019 ACTUAL PROBLEMS OF SYSTEMS AND SOFTWARE ENGINEERING (APSSE 2019), 2019, : 103 - 108
  • [47] Short Paper: Integrating the Data Protection Impact Assessment into the Software Development Lifecycle
    Irvine, Christopher
    Balasubramaniam, Dharini
    Henderson, Tristan
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2020, DPM 2020, CBT 2020, 2020, 12484 : 219 - 228
  • [48] Cloud Service Brokerage: A systematic literature review using a software development lifecycle
    Paulsson, Victoria
    Emeakaroha, Vincent C.
    Morrison, John
    Lynn, Theo
    [J]. AMCIS 2016 PROCEEDINGS, 2016,
  • [49] A Simulation Model of Software Quality Assurance in the Software Lifecycle
    Nakahara, Hiroto
    Monden, Akito
    Yucel, Zeynep
    [J]. 22ND IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2021-FALL), 2021, : 236 - 241
  • [50] Security Threat and Vulnerability Assessment and Measurement in Secure Software Development
    Humayun, Mamoona
    Jhanjhi, N. Z.
    Almufareh, Maram Fahhad
    Khalil, Muhammad Ibrahim
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 5039 - 5059