Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems

被引:0
|
作者
Anand, Priya [1 ]
Ryoo, Jungwoo [1 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
来源
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) | 2019年
关键词
Software Architecture; Security; Vulnerability; Cross-Site Scripting; Security Patterns;
D O I
10.1145/3230833.3233766
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security issues emerging out of the constantly evolving software applications became a huge challenge to software security experts. In this paper, we propose a prototype to detect vulnerabilities by identifying their architectural sources and also use security patterns to mitigate the identified vulnerabilities. We emphasize the need to consider architectural relations to introduce an effective security solution. In this research, we focused on the taint-style vulnerabilities that can induce injection-based attacks like XSS, SQLI in web applications. With numerous tools available to detect the taint-style vulnerabilities in the web applications, we scanned for the presence of repetition of a vulnerable code pattern in the software. Very importantly, we attempted to identify the architectural source files or modules by developing a tool named ArT Analyzer. We conducted a case study on a leading health-care software by applying the proposed architectural taint analysis and identified the vulnerable spots. We could identify the architectural roots for those vulnerable spots with the use of our tool ArT Analyzer. We verified the results by sharing it with the lead software architect of the project. By adopting an architectural solution, we avoided changes to be done on 252 different lines of code by merely introducing 2 lines of code changes at the architectural roots. Eventually, this solution was integrated into the latest updated release of the health-care software.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Security Issues and Vulnerabilities in Connected Car Systems
    Becsi, Tamas
    Aradi, Szilard
    Gaspar, Peter
    2015 INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2015, : 477 - 482
  • [22] Investigating Security Vulnerabilities in Modern Vehicle Systems
    Zheng, Xi
    Pan, Lei
    Chen, Hongxu
    Wang, Peiyin
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 29 - 40
  • [23] Availability Assessment of Embedded Systems with Security Vulnerabilities
    Kornecki, Andrew J.
    Zalewski, Janusz
    Stevenson, Wendy F.
    2011 34TH IEEE SOFTWARE ENGINEERING WORKSHOP (SEW 2011), 2011, : 42 - 47
  • [24] AN APPROACH FOR DETECTING SECURITY VULNERABILITIES IN WEB BROWSERS FOR MOBILE OPERATING SYSTEMS
    Mechev, Stoyan
    MATHEMATICS AND INFORMATICS, 2024, 67 (05): : 475 - 488
  • [25] Exploitability prediction of software vulnerabilities
    Bhatt, Navneet
    Anand, Adarsh
    Yadavalli, V. S. S.
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2021, 37 (02) : 648 - 663
  • [26] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [27] An Analytical Security Model for Existing Software Systems
    Isazadeh, Ayaz
    Elgedawy, Islam
    Karimpour, Jaber
    Izadkhah, Habib
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02): : 691 - 702
  • [28] Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification
    Alhawi, Omar M.
    Mustafa, Mustafa A.
    Cordiro, Lucas C.
    2019 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2019), 2019, : 9 - 17
  • [29] Security of Cyber Physical Systems: Vulnerabilities, Attacks and Countermeasure
    Alrefaei, Faisal
    Alzahrani, Abdullah
    Song, Houbing
    Zohdy, Mohamed
    2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), 2020, : 551 - 556
  • [30] A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
    Chen, Huashan
    Pendleton, Marcus
    Njilla, Laurent
    Xu, Shouhuai
    ACM COMPUTING SURVEYS, 2020, 53 (03)