Mapping the field of software life cycle security metrics

被引:26
|
作者
Morrison, Patrick [1 ]
Moye, David [1 ]
Pandita, Rahul [1 ,2 ]
Williams, Laurie [1 ]
机构
[1] North Carolina State Univ, Raleigh, NC 27695 USA
[2] Phase Change Software LLC, Golden, CO USA
关键词
Metrics; Measurement; Security;
D O I
10.1016/j.infsof.2018.05.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Practitioners establish a piece of software's security objectives during the software development process. To support control and assessment, practitioners and researchers seek to measure security risks and mitigations during software development projects. Metrics provide one means for assessing whether software security objectives have been achieved. A catalog of security metrics for the software development life cycle could assist practitioners in choosing appropriate metrics, and researchers in identifying opportunities for refinement of security measurement. Objective: The goal of this research is to support practitioner and researcher use of security measurement in the software life cycle by cataloging security metrics presented in the literature, their validation, and the subjects they measure. Method: We conducted a systematic mapping study, beginning with 4818 papers and narrowing down to 71 papers reporting on 324 unique security metrics. For each metric, we identified the subject being measured, how the metric has been validated, and how the metric is used. We categorized the metrics, and give examples of metrics for each category. Results: In our data, 85% of security metrics have been proposed and evaluated solely by their authors, leaving room for replication and confirmation through field studies. Approximately 60% of the metrics have been empirically evaluated, by their authors or by others. The available metrics are weighted heavily toward the implementation and operations phases, with relatively few metrics for requirements, design, and testing phases of software development. Some artifacts and processes remain unmeasured. Measured by phase, Testing received the least attention, with 1.5% of the metrics. Conclusions: At present, the primary application of security metrics to the software development life cycle in the literature is to study the relationship between properties of source code and reported vulnerabilities. The most-cited and most used metric, vulnerability count, has multiple definitions and operationalizations. We suggest that researchers must check vulnerability count definitions when making comparisons between papers. In addition to refining vulnerability measurement, we see research opportunities for greater attention to metrics for the requirement, design, and testing phases of development. We conjecture from our data that the field of software life cycle security metrics has yet to converge on an accepted set of metrics.
引用
收藏
页码:146 / 159
页数:14
相关论文
共 50 条
  • [21] An integrated security testing framework for Secure Software Development Life Cycle
    Tung, Yuan-Hsin
    Lo, Sheng-Chen
    Shih, Jen-Feng
    Lin, Hung-Fu
    2016 18TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2016,
  • [22] Current Taxonomy of Information Security Threats in Software Development Life Cycle
    Barabanov, Alexander V.
    Markov, Alexey S.
    Grishin, Maksim I.
    Tsirlov, Valentin L.
    2018 IEEE 12TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2018, : 196 - 201
  • [23] Security Evaluation for Software System with Vulnerability Life Cycle and User Profiles
    Okamura, Hiroyuki
    Tokuzane, Masataka
    Dohi, Tadashi
    2012 WORKSHOP ON DEPENDABLE TRANSPORTATION SYSTEMS/RECENT ADVANCES IN SOFTWARE DEPENDABILITY (WDTS-RASD 2012), 2012, : 39 - 44
  • [24] Using Special Use Cases for Security in the Software Development Life Cycle
    Tenday, Jean-Marie Kabasele
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 122 - 134
  • [25] Mapping DevOps capabilities to the software life cycle: A systematic literature review
    Amaro, Ricardo
    Pereira, Ruben
    da Silva, Miguel Mira
    INFORMATION AND SOFTWARE TECHNOLOGY, 2025, 177
  • [26] Assuring Software Security Against Buffer Overflow Attacks in Embedded Software Development Life Cycle
    Park, Chul Su
    Lee, Jae Hee
    Seo, Seong Chae
    Kim, Byung Ki
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 787 - 790
  • [27] Research of Software Complexity Metrics with Security Indicator
    付剑晶
    王珂
    JournalofDonghuaUniversity(EnglishEdition), 2011, 28 (05) : 460 - 464
  • [28] Software Security, Privacy, and Dependability Metrics and Measurement
    Hatzivasilis, George
    Papaefstathiou, Ioannis
    Manifavas, Charalampos
    IEEE SOFTWARE, 2016, 33 (04) : 46 - 54
  • [29] Using complexity metrics to improve software security
    Moshtari, Sara
    Sami, Ashkan
    Azimi, Mahdi
    Computer Fraud and Security, 2013, 2013 (05): : 8 - 17
  • [30] A Preliminary Mapping Study of Software Metrics Thresholds
    Ronchieri, Elisabetta
    Canaparo, Marco
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 232 - 240