Information Technology Security Evaluation Using CERT C Secure Coding Standard

被引:0
|
作者
Lee, Taeseung [2 ]
Lee, Kwangwoo [2 ]
Won, Dongho [2 ]
Park, Namje [1 ]
机构
[1] Jeju Natl Univ, Teachers Coll, Dept Comp Educ, Cheju, South Korea
[2] Sungkyunkwan Univ, Sch Informat & Commun Engn, Informat Secur Grp, Suwon 440746, Gyeonggi Do, South Korea
来源
关键词
Common criteria; Secure coding; CERT C Secure Coding Standard; Evaluation; APPLICATION DATA-MANAGEMENT; PROTECTION PROFILE; RFID ENVIRONMENT; SERVICE; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IT products developed without due consideration of security issues have caused many security accidents over the last ten years. As a result, the importance of security in software development is increasing. It is important to ensure that no known vulnerabilities remain in the design, development, and test stage, in order to develop secure IT products. Even when an IT product is designed securely, various security vulnerabilities can occur, such as buffer overflow, if the general coding technique is used at the development stage. Therefore, the introduction of secure coding rules becomes most critical in developing a robust information security product. This paper proposes a method of applying a secure coding standard in the CC evaluation process. The proposed method is expected to contribute to improving the security of IT products in the CC evaluation process.
引用
收藏
页码:335 / +
页数:2
相关论文
共 50 条
  • [1] Coccinelle: Tool support for automated CERT C Secure Coding Standard certification
    Olesen, Mads Chr.
    Hansen, Rene Rydhof
    Lawall, Julia L.
    Palix, Nicolas
    SCIENCE OF COMPUTER PROGRAMMING, 2014, 91 : 141 - 160
  • [2] Multiple Program Analysis Techniques Enable Precise Check for SEI CERT C Coding Standard
    Nguyen, Thu-Trang
    Aoki, Toshiaki
    Tomita, Takashi
    Yamada, Iori
    2019 26TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), 2019, : 70 - 77
  • [3] SECURITY EVALUATION IN INFORMATION TECHNOLOGY STANDARDS
    GENTILE, F
    GIURI, L
    GUIDA, F
    MONTOLIVO, E
    VOLPE, M
    COMPUTERS & SECURITY, 1994, 13 (08) : 647 - 650
  • [4] Information technology security using cryptography
    Sanchez-Reillo, R
    Lopez-Ongil, C
    Entrena-Arrontes, L
    Sanchez-Avila, C
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2003, 18 (06) : 21 - 24
  • [5] RECENT DEVELOPMENT IN INFORMATION TECHNOLOGY SECURITY EVALUATION - THE NEED FOR EVALUATION CRITERIA FOR MULTILATERAL SECURITY
    RANNENBERG, K
    SECURITY AND CONTROL OF INFORMATION TECHNOLOGY IN SOCIETY, 1994, 43 : 113 - 128
  • [6] Towards Secure Information Systems: Developing and Implementing an Information Security Evaluation Model Using NIST CSF and COBIT 2019
    Fadya, Mifta
    Utama, Ditdit Nugraha
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2025, 14 (01): : 182 - 191
  • [7] Efficient Video Coding Using Visual Sensitive Information for HEVC Coding Standard
    Podder, Pallab Kanti
    Paul, Manoranjan
    Murshed, Manzur
    IEEE ACCESS, 2018, 6 : 75695 - 75708
  • [8] On Supporting Secure Information Distribution in Heterogeneous Systems Using Standard Technologies
    Mousas, Aziz S.
    Anadiotis, Angelos-Christos G.
    Lioudakis, Georgios V.
    Papanis, John P.
    Gkonis, Panagiotis K.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 76 (01) : 99 - 119
  • [9] On Supporting Secure Information Distribution in Heterogeneous Systems Using Standard Technologies
    Aziz S. Mousas
    Angelos-Christos G. Anadiotis
    Georgios V. Lioudakis
    John P. Papanis
    Panagiotis K. Gkonis
    Dimitra I. Kaklamani
    Iakovos S. Venieris
    Wireless Personal Communications, 2014, 76 : 99 - 119
  • [10] Secure and Efficient Exchange of Threat Information Using Blockchain Technology
    Pahlevan, Maryam
    Ionita, Valentin
    INFORMATION, 2022, 13 (10)