Incorporating Security into Software Development Process

被引:0
|
作者
Yoshioka, R. [1 ]
Watanobe, Y. [1 ]
Mirenkov, N. [1 ]
机构
[1] Univ Aizu, Aizu Wakamatsu, Fukushima, Japan
关键词
D O I
10.3233/978-1-58603-916-5-99
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A general scheme of software development process is considered and some aspects related to integrating security into this scheme are analyzed. In particular, semantic-based, defense-in-depth techniques embedded into system/component defense shields and data acquiring/monitoring kernels are considered. The defense shields are to semantically check data of every input before a software component may process them and also to check every output before sending it to other components. The kernels are to regularly perform semantic analysis of the internal status and local data of a component/system. Based on these two ideas, real-time discovery of Vulnerabilities and threats is possible even when various protective measures, such as, passwords, firewalls, intrusion detection systems, access control lists, etc. have been breached. Existing programming systems and possible new methods to realize the shields and kernels are also considered.
引用
收藏
页码:99 / 109
页数:11
相关论文
共 50 条
  • [41] SECURITY SENSITIVE SOFTWARE-DEVELOPMENT
    RESSLER, MP
    1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 89 - 91
  • [42] Strong security starts with software development
    Cope R.
    Network Security, 2020, 2020 (07) : 6 - 9
  • [43] Security Practices in Agile Software Development
    Selva-Mora, Alejandra
    Quesada-Lopez, Christian
    PROCEEDINGS 2024 IEEE/ACM INTERNATIONAL WORKSHOP ON SOFTWARE-INTENSIVE BUSINESS, IWSIB 2024, 2024, : 56 - 63
  • [44] A Security Ontology with MDA for Software Development
    Kang, Wentao
    Liang, Ying
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 67 - 74
  • [45] Evaluation Process Management Software for Security Evaluation
    Razzazi, Mohammadreza
    Tahouri, Ali
    Fayazbakhsh, Kaveh
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 1628 - 1631
  • [46] Incorporating software security: using developer workshops to engage product managers
    Weir, Charles
    Becker, Ingolf
    Blair, Lynne
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (02)
  • [47] Incorporating software security: using developer workshops to engage product managers
    Charles Weir
    Ingolf Becker
    Lynne Blair
    Empirical Software Engineering, 2023, 28
  • [48] Using Software Development Artifacts to Improve the Software Development Process
    Conners, Shannon Burns
    Morgan, Joseph
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 13 - 13
  • [49] Towards Incorporation of Software Security Testing Framework in Software Development
    Hassan, Nor Hafeizah
    Selamat, Siti Rahayu
    Sahib, Shahrin
    Hussin, Burairah
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 1, 2011, 179 : 16 - 30
  • [50] Back to the Drawing Board Bringing Security Constraints in an Architecture-centric Software Development Process
    Jasser, Stefanie
    Tuma, Katja
    Scandariato, Riccardo
    Riebisch, Matthias
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 438 - 446