Incorporating Security into Software Development Process

被引:0
作者
Yoshioka, R. [1 ]
Watanobe, Y. [1 ]
Mirenkov, N. [1 ]
机构
[1] Univ Aizu, Aizu Wakamatsu, Fukushima, Japan
来源
NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES | 2008年 / 182卷
关键词
D O I
10.3233/978-1-58603-916-5-99
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A general scheme of software development process is considered and some aspects related to integrating security into this scheme are analyzed. In particular, semantic-based, defense-in-depth techniques embedded into system/component defense shields and data acquiring/monitoring kernels are considered. The defense shields are to semantically check data of every input before a software component may process them and also to check every output before sending it to other components. The kernels are to regularly perform semantic analysis of the internal status and local data of a component/system. Based on these two ideas, real-time discovery of Vulnerabilities and threats is possible even when various protective measures, such as, passwords, firewalls, intrusion detection systems, access control lists, etc. have been breached. Existing programming systems and possible new methods to realize the shields and kernels are also considered.
引用
收藏
页码:99 / 109
页数:11
相关论文
共 22 条
[1]  
[Anonymous], 2004, INTRO COMPUTER SECUR
[2]  
Clarke EM, 1999, MODEL CHECKING, P1
[3]   HINTS ON TEST DATA SELECTION - HELP FOR PRACTICING PROGRAMMER [J].
DEMILLO, RA ;
LIPTON, RJ .
COMPUTER, 1978, 11 (04) :34-41
[4]   Filmification of methods and an example of its applications [J].
Ebihara, T ;
Mirenkov, N ;
Nemoto, M ;
Nomoto, R .
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2005, 15 (01) :87-115
[5]  
*FED, FED SELINUX
[6]  
Gao J., 2003, TESTING QUALITY ASSU
[7]   An approach for understanding and testing third party software components [J].
Haddox, JM ;
Kapfhammer, GM ;
Michael, CC .
ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2002 PROCEEDINGS, 2002, :293-299
[8]   TESTING PROGRAMS WITH AID OF A COMPILER [J].
HAMLET, RG .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1977, 3 (04) :279-290
[9]   An approach to specify and test component-based dependable software [J].
Jhumka, A ;
Hiller, M ;
Suri, N .
7TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2002, :211-220
[10]   An approach to testing black-box components using contract-based mutation [J].
Jiang, Ying ;
Hou, Shan-Shan ;
Shan, Jin-Hui ;
Zhang, Lu ;
Xie, Bing .
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2008, 18 (01) :93-117