Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems

被引:0
|
作者
Anand, Priya [1 ]
Ryoo, Jungwoo [1 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
关键词
Software Architecture; Security; Vulnerability; Cross-Site Scripting; Security Patterns;
D O I
10.1145/3230833.3233766
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security issues emerging out of the constantly evolving software applications became a huge challenge to software security experts. In this paper, we propose a prototype to detect vulnerabilities by identifying their architectural sources and also use security patterns to mitigate the identified vulnerabilities. We emphasize the need to consider architectural relations to introduce an effective security solution. In this research, we focused on the taint-style vulnerabilities that can induce injection-based attacks like XSS, SQLI in web applications. With numerous tools available to detect the taint-style vulnerabilities in the web applications, we scanned for the presence of repetition of a vulnerable code pattern in the software. Very importantly, we attempted to identify the architectural source files or modules by developing a tool named ArT Analyzer. We conducted a case study on a leading health-care software by applying the proposed architectural taint analysis and identified the vulnerable spots. We could identify the architectural roots for those vulnerable spots with the use of our tool ArT Analyzer. We verified the results by sharing it with the lead software architect of the project. By adopting an architectural solution, we avoided changes to be done on 252 different lines of code by merely introducing 2 lines of code changes at the architectural roots. Eventually, this solution was integrated into the latest updated release of the health-care software.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Security Vulnerabilities and Solutions in Mobile WiMAX
    Deininger, Andreas
    Kiyomoto, Shinsaku
    Kurihara, Jun
    Tanaka, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (11): : 7 - 15
  • [22] A Study of Security Vulnerabilities and Software Weaknesses in Vehicles
    Xiong, Wenjun
    Gulsever, Melek
    Kaya, Koray Mustafa
    Lagerstrom, Robert
    SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 204 - 218
  • [23] Software Security Vulnerabilities Seen As Feature Interactions
    Jourdan, Guy-Vincent
    FEATURE INTERACTIONS IN SOFTWARE AND COMMUNICATION SYSTEMS X, 2009, : 149 - 159
  • [24] Mapping Software Faults with Web Security Vulnerabilities
    Fonseca, Jose
    Vieira, Marco
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 257 - +
  • [25] Vulnerabilities and Threats in Cloud Software Engineering Security
    Yu, Weider D.
    Runiassy, Maryam
    Yin, Yijun
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1822 - 1831
  • [26] Model checking security vulnerabilities in software design
    Li Jinhua
    Li Jing
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [27] A software architectural approach to security by design
    Ray, Arnab
    Cleaveland, Rance
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 83 - +
  • [28] In Search of Architectural Patterns for Software Security
    Ryoo, Jungwoo
    Laplante, Phil
    Kazman, Rick
    COMPUTER, 2009, 42 (06) : 98 - 100
  • [29] System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats
    Choi, Seul-Ki
    Yang, Chung-Huang
    Kwak, Jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 906 - 918
  • [30] E-Learning Software Security Tested for Security Vulnerabilities & Issues
    Violettas, George E.
    Theodorou, Tryfon L.
    Stephanides, George C.
    2013 FOURTH INTERNATIONAL CONFERENCE ON E-LEARNING "BEST PRACTICES IN MANAGEMENT, DESIGN AND DEVELOPMENT OF E-COURSES: STANDARDS OF EXCELLENCE AND CREATIVITY, 2013, : 233 - 240