Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems

被引:0
|
作者
Anand, Priya [1 ]
Ryoo, Jungwoo [1 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
关键词
Software Architecture; Security; Vulnerability; Cross-Site Scripting; Security Patterns;
D O I
10.1145/3230833.3233766
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security issues emerging out of the constantly evolving software applications became a huge challenge to software security experts. In this paper, we propose a prototype to detect vulnerabilities by identifying their architectural sources and also use security patterns to mitigate the identified vulnerabilities. We emphasize the need to consider architectural relations to introduce an effective security solution. In this research, we focused on the taint-style vulnerabilities that can induce injection-based attacks like XSS, SQLI in web applications. With numerous tools available to detect the taint-style vulnerabilities in the web applications, we scanned for the presence of repetition of a vulnerable code pattern in the software. Very importantly, we attempted to identify the architectural source files or modules by developing a tool named ArT Analyzer. We conducted a case study on a leading health-care software by applying the proposed architectural taint analysis and identified the vulnerable spots. We could identify the architectural roots for those vulnerable spots with the use of our tool ArT Analyzer. We verified the results by sharing it with the lead software architect of the project. By adopting an architectural solution, we avoided changes to be done on 252 different lines of code by merely introducing 2 lines of code changes at the architectural roots. Eventually, this solution was integrated into the latest updated release of the health-care software.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] An analysis of mobile WiMAX security: Vulnerabilities and solutions
    Shon, Taeshik
    Choi, Wook
    NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2007, 4658 : 88 - +
  • [32] Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
    Han, Tao
    Zhang, Ning
    Liu, Kaiming
    Tang, Bihua
    Liu, Yuan'an
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 828 - 833
  • [33] Introduction to Quantum Systems and Security Vulnerabilities
    Astaburuaga, Ignacio
    Sengupta, Shamik
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 345 - 351
  • [34] Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study
    Alves, Henrique
    Fonseca, Baldoino
    Antunes, Nuno
    2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016), 2016, : 37 - 44
  • [35] Understanding Security Vulnerabilities in File Systems
    Cai, Miao
    Huang, Hao
    Huang, Jian
    APSYS'19: PROCEEDINGS OF THE 10TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, 2019, : 8 - 15
  • [36] On Privacy Weaknesses and Vulnerabilities in Software Systems
    Sangaroonsilp, Pattaraporn
    Dam, Hoa Khanh
    Ghose, Aditya
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 1071 - 1083
  • [37] Do Software Security Practices Yield Fewer Vulnerabilities?
    Zahan, Nusrat
    Shohan, Shohanuzzaman
    Harris, Dan
    Williams, Laurie
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE, ICSE-SEIP, 2023, : 292 - 303
  • [38] Software Security: Vulnerabilities and Countermeasures for Two Attacker Models
    Piessens, Frank
    Verbauwhede, Ingrid
    PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 990 - 999
  • [39] A software security assessment system based on analysis of vulnerabilities
    Sui, Chenmeng
    Liu, Yanzhao
    Liu, Yun
    Journal of Convergence Information Technology, 2012, 7 (06) : 211 - 219
  • [40] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Carlos M. Mejía-Granda
    José L. Fernández-Alemán
    Juan M. Carrillo-de-Gea
    José A. García-Berná
    Medical & Biological Engineering & Computing, 2024, 62 : 257 - 273