Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems

被引:0
|
作者
Anand, Priya [1 ]
Ryoo, Jungwoo [1 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
关键词
Software Architecture; Security; Vulnerability; Cross-Site Scripting; Security Patterns;
D O I
10.1145/3230833.3233766
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security issues emerging out of the constantly evolving software applications became a huge challenge to software security experts. In this paper, we propose a prototype to detect vulnerabilities by identifying their architectural sources and also use security patterns to mitigate the identified vulnerabilities. We emphasize the need to consider architectural relations to introduce an effective security solution. In this research, we focused on the taint-style vulnerabilities that can induce injection-based attacks like XSS, SQLI in web applications. With numerous tools available to detect the taint-style vulnerabilities in the web applications, we scanned for the presence of repetition of a vulnerable code pattern in the software. Very importantly, we attempted to identify the architectural source files or modules by developing a tool named ArT Analyzer. We conducted a case study on a leading health-care software by applying the proposed architectural taint analysis and identified the vulnerable spots. We could identify the architectural roots for those vulnerable spots with the use of our tool ArT Analyzer. We verified the results by sharing it with the lead software architect of the project. By adopting an architectural solution, we avoided changes to be done on 252 different lines of code by merely introducing 2 lines of code changes at the architectural roots. Eventually, this solution was integrated into the latest updated release of the health-care software.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Security vulnerabilities in software systems: A quantitative perspective
    Alhazmi, O
    Malaiya, Y
    Ray, I
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 281 - 294
  • [2] Architectural Security Weaknesses in Industrial Control Systems (ICS) An Empirical Study based on Disclosed Software Vulnerabilities
    Gonzalez, Danielle
    Alhenaki, Fawaz
    Mirakhorli, Mehdi
    2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA), 2019, : 31 - 40
  • [3] Understanding Software Security Vulnerabilities in Cloud Server Systems
    Tunde-Onadele, Olufogorehan
    Lin, Yuhang
    Gu, Xiaohui
    He, Jingzhu
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), 2022, : 245 - 252
  • [4] Tracking Known Security Vulnerabilities in Proprietary Software Systems
    Cadariu, Mircea
    Bouwers, Eric
    Visser, Joost
    van Deursen, Arie
    2015 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), 2015, : 516 - 519
  • [5] Managing Publicly Known Security Vulnerabilities in Software Systems
    Mahrous, Hesham
    Malhotra, Baljeet
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 247 - 256
  • [6] Measuring, analyzing and predicting security vulnerabilities in software systems
    Alhazmi, O. H.
    Malaiya, Y. K.
    Ray, I.
    COMPUTERS & SECURITY, 2007, 26 (03) : 219 - 228
  • [7] A SURVEY OF SECURITY IN ROBOTIC SYSTEMS: VULNERABILITIES, ATTACKS, AND SOLUTIONS
    Archibald, Christopher
    Schwalm, Luke
    Ball, John E.
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2017, 32 (02): : 151 - 157
  • [8] Labeling Software Security Vulnerabilities
    Bojanova, Irena
    Guerrerio, John J.
    IT PROFESSIONAL, 2023, 25 (05) : 64 - 70
  • [9] Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective
    Aslam, Muhammad Muzamil
    Tufail, Ali
    Apong, Rosyzie Anna Awg Haji Mohd
    De Silva, Liyanage Chandratilak
    Raza, Muhammad Taqi
    IEEE ACCESS, 2024, 12 : 67537 - 67573
  • [10] A model-driven formal methods approach to software architectural security vulnerabilities specification and verification
    Rouland, Quentin
    Hamid, Brahim
    Jaskolka, Jason
    JOURNAL OF SYSTEMS AND SOFTWARE, 2025, 219