Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems

被引:0
|
作者
Anand, Priya [1 ]
Ryoo, Jungwoo [1 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
关键词
Software Architecture; Security; Vulnerability; Cross-Site Scripting; Security Patterns;
D O I
10.1145/3230833.3233766
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security issues emerging out of the constantly evolving software applications became a huge challenge to software security experts. In this paper, we propose a prototype to detect vulnerabilities by identifying their architectural sources and also use security patterns to mitigate the identified vulnerabilities. We emphasize the need to consider architectural relations to introduce an effective security solution. In this research, we focused on the taint-style vulnerabilities that can induce injection-based attacks like XSS, SQLI in web applications. With numerous tools available to detect the taint-style vulnerabilities in the web applications, we scanned for the presence of repetition of a vulnerable code pattern in the software. Very importantly, we attempted to identify the architectural source files or modules by developing a tool named ArT Analyzer. We conducted a case study on a leading health-care software by applying the proposed architectural taint analysis and identified the vulnerable spots. We could identify the architectural roots for those vulnerable spots with the use of our tool ArT Analyzer. We verified the results by sharing it with the lead software architect of the project. By adopting an architectural solution, we avoided changes to be done on 252 different lines of code by merely introducing 2 lines of code changes at the architectural roots. Eventually, this solution was integrated into the latest updated release of the health-care software.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A practical framework for dynamically immunizing software security vulnerabilities
    Lin, Zhiqiang
    Mao, Bing
    Xie, Li
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 348 - +
  • [42] The Appilication of Fuzzing in Web software security vulnerabilities Test
    Li, Li
    Dong, Qiu
    Liu, Dan
    Zhu, Leilei
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 130 - 133
  • [43] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Mejia-Granda, Carlos M.
    Fernandez-Aleman, Jose L.
    Carrillo-de-Gea, Juan M.
    Garcia-Berna, Jose A.
    MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2024, 62 (01) : 257 - 273
  • [44] OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
    Singh, Jaimandeep
    Chaudhary, Naveen Kumar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [45] Software Architectural Design meets Security Engineering
    Bode, Stephan
    Fischer, Anja
    Kuehnhauser, Winfried
    Riebisch, Matthias
    16TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, 2009, : 109 - 118
  • [46] ON ARCHITECTURAL SUPPORT FOR SYSTEMS SECURITY
    Tiwari, Mohit
    Austin, Todd
    IEEE MICRO, 2016, 36 (05) : 6 - 7
  • [47] OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
    Singh, Jaimandeep
    Chaudhary, Naveen Kumar
    Journal of Information Security and Applications, 2022, 65
  • [48] Immersive and Authentic Learning Environments to Mitigate Security Vulnerabilities in Networked Game Devices
    Ridgewell, Walter W.
    Kumar, Vive
    Dr Kinshuk
    2013 INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2013, : 1042 - 1048
  • [49] Analysis of Models of Security to Mitigate the Risks, Vulnerabilities and Threats in a Company of Services of Telecommunications
    Toapanta Toapanta, Segundo Moises
    Mafla Gallegos, Luis Enrique
    Chevez Moran, Maria Jose
    Ortiz Rojas, Javier Gonzalo
    2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 445 - 450
  • [50] Solutions for RFID Smart Tagged Card Security Vulnerabilities
    Williamson, Avery, Sr.
    Tsay, Li-Shiang
    Kateeb, Ibraheem A.
    Burton, Lany
    2013 AASRI CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL, 2013, 4 : 282 - 287