Reducing software security risk through an integrated approach

被引:1
|
作者
Gilliam, DP [1 ]
Powell, JD [1 ]
Kelly, JC [1 ]
Bishop, M [1 ]
机构
[1] CALTECH, Jet Prop Lab, Pasadena, CA 91125 USA
关键词
security toolset; vulnerability matrix; property-based testing; model checking; security; verification;
D O I
10.1109/SEW.2001.992653
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents joint work by the California Institute of Technology's Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the National Aeronautics and Space Administration Goddard Independent Verification and Validation Facility to develop a security assessment instrument for the software development and maintenance life Cycle. Vulnerabilities in operating systems and software applications render an otherwise secure environment insecure. Any operating system or application added to a secure environment that has exploitable security vulnerabilities affects the security of the whole environment. An otherwise secure system can be compromised easily if the system or application software on it, or on a linked system, has vulnerabilities. Therefore, it is critical that software on networked computer systems be free from security vulnerabilities. Security, vulnerabilities in software arise from a number of development factors; but these vulnerabilities can generally be traced to poor software development practices, new modes of attacks, mis-configurations, and unsecured links between systems. A Software security assessment instrument can aid in providing a greater level of assurance that software is not exposed to vulnerabilities as a result of defective software requirements, designs, code or exposures due to code complexity, and integration with other applications that are network aware. This paper presents research on the generation of a software security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles. The research presented here is available at: http://security.jpl.nasa.gov/rssr.
引用
收藏
页码:36 / 42
页数:7
相关论文
共 50 条
  • [21] An integrated approach to industrial security
    Harmon, Jon
    CHEMICAL ENGINEERING, 2008, 115 (05) : 42 - 46
  • [22] Agent security through software mutation
    Simmons, Sharon
    Edwards, Dennis
    Zimmerman, Travis
    INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 211 - 215
  • [23] Integrated approach to stockholding software
    Steel Times, 1994, 222 (02):
  • [24] Software Vulnerability and Application Security Risk
    Peng, Jianping
    Guo, Meiwen
    Quan, Jing
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2019, 32 (01) : 48 - 57
  • [25] A New Approach To Measure Software Security
    Han, Wei
    Ye, Hairong
    Ding, Zuohua
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 1352 - 1357
  • [26] Software rejuvenation approach to security engineering
    Aung, KMM
    Park, JS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 574 - 583
  • [27] A software architectural approach to security by design
    Ray, Arnab
    Cleaveland, Rance
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 83 - +
  • [28] A Clairvoyant Approach to Evaluating Software (In)Security
    Jain, Bhushan
    Tsai, Chia-Che
    Porter, Donald E.
    PROCEEDINGS OF THE 16TH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS (HOTOS 2017), 2017, : 62 - 68
  • [29] A commercial software approach to workstation security
    Marmion, D
    LIBRARY HI TECH, 1997, 15 (1-2) : 21 - 23
  • [30] A Contextual Guidance Approach to Software Security
    Schugerl, Philipp
    Walsh, David
    Rilling, Juergen
    Charland, Philippe
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 867 - +