A taxonomy for improving industry-academia communication in IoT vulnerability management

被引:2
作者
Rico, Sergio [1 ]
Engstrom, Emelie [1 ]
Host, Martin [1 ]
机构
[1] Lund Univ, Dept Comp Sci, Lund, Sweden
来源
2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019) | 2019年
关键词
industry-academia communication; taxonomy; security; IoT; SECURITY; INTERNET; THINGS;
D O I
10.1109/SEAA.2019.00014
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Background: In software engineering, industry-academia is a symbiotic relationship. Researchers need to be aware of the industry to produce relevant research, while practitioners are educated in academia and could take advantage of empirical research. The SERP taxonomy architecture is designed to support communication between practitioners and researchers in software engineering. Objective: The purpose of this study is to analyze to what extent the SERP taxonomy architecture is useful for improving communication between researchers and practitioners in IoT vulnerability management. Method: We developed a SERP taxonomy for IoT vulnerability management, SERP-MENTION, in an incremental way. Along the development, we evaluated the developed taxonomy in a project of industry academia collaboration. Results: In addition to the taxonomy itself we elaborate on the taxonomy development process and the potential of SERP-MENTION to support communication between researchers and practitioners within the area. Conclusion: The SERP architecture can be used in a new field, it is perceived as useful by potential users to better describe and communicate research outputs and practical challenges in software vulnerability management.
引用
收藏
页码:38 / 45
页数:8
相关论文
共 26 条
[1]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[2]  
Ali N. b., 2019, EMPIRICAL SOFTWARE E
[3]   An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure [J].
Arora, Ashish ;
Krishnan, Ramayya ;
Telang, Rahul ;
Yang, Yubao .
INFORMATION SYSTEMS RESEARCH, 2010, 21 (01) :115-132
[4]   Attitudes and Perceptions of IoT Security in Critical Societal Services [J].
Asplund, Mikael ;
Nadjm-Tehrani, Simin .
IEEE ACCESS, 2016, 4 :2130-2138
[5]  
Babar S, 2010, COMM COM INF SC, V89, P420
[6]   Critical success factors taxonomy for software process deployment [J].
Bayona-Ore, Sussy ;
Calvo-Manzano, Jose A. ;
Cuevas, Gonzalo ;
San-Feliu, Tomas .
SOFTWARE QUALITY JOURNAL, 2014, 22 (01) :21-48
[7]  
Bideh P. Nikbakht, 2018, P INT C PROD FOC SOF
[8]   Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code [J].
Cobleigh, Alexander ;
Hell, Martin ;
Karlsson, Linus ;
Reimer, Oscar ;
Sonnerup, Jonathan ;
Wisenhoff, Daniel .
2018 IEEE 22ND INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2018), 2018, :208-211
[9]   Internet of Things: a definition & taxonomy [J].
Dorsemaine, Bruno ;
Gaulier, Jean-Philippe ;
Wary, Jean-Philippe ;
Kheir, Nizar ;
Urien, Pascal .
2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, :72-76
[10]  
Edling N, 2014, ANALYSING SOCIAL POLICY CONCEPTS AND LANGUAGE: COMPARATIVE AND TRANSNATIONAL PERSPECTIVES, P13