Course Modules for Software Security

نویسندگان

  • Austin Frazier
  • Xiaohong Yuan
  • Yaohang Li
  • Stephan Hudson
چکیده

Each year the reported number of security vulnerabilities increases as does the sophistication of attacks to exploit these vulnerabilities. Most security vulnerabilities are the result of insecure coding practices. There is a critical need to increase the security education of computer science students, particularly in software security. We are designing course modules, to be used at the undergraduate or graduate level, to integrate software system security into our computer science curriculum. The course modules we have developed, and are developing, include: operating system security, software security testing, code review, risk analysis, and database security. Each course module includes lecture materials, inclass demonstrations, and hands-on assignments. These course modules are designed to be integrated into existing courses. The software security testing and database security modules were taught at this university in the Fall 2007 semester and received positive feedback from student surveys and questionnaires. The other modules will be taught in the Spring 2008 semester. Future work will include the development of more topics in these modules and the creation of new modules in secure software development. Index terms – Secure Software Engineering, Risk Analysis, Code Review, Operating System Security, Database Security, Secure Software Testing

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base

In this paper we propose Sancus, a security architecture for networked embedded devices. Sancus supports extensibility in the form of remote (even third-party) software installation on devices while maintaining strong security guarantees. More specifically, Sancus can remotely attest to a software provider that a specific software module is running uncompromised, and can authenticate messages f...

متن کامل

Security Implications of Hardware vs. Software Cryptographic Modules

Cryptographic modules can be implemented either by hardware or by software. Whereas software implementations are known for being easier to develop and to maintain, when it comes to cryptographic modules or security-related applications in general, software implementations are significantly less secure than their hardware equivalents. The reason for this is mostly the fact that software solution...

متن کامل

Linux Security Module Framework

Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly endless stream of software security vulnerabilities. Security research has produced numerous access control mechanisms that help improve system security; however, there is little consensus on the best solution. Many powerful security systems have been implemented as research prototypes or highly sp...

متن کامل

BreakApp: Automated, Flexible Application Compartmentalization

Developers of large-scale software systems may use third-party modules to reduce costs and accelerate release cycles, at some risk to safety and security. BREAKAPP exploits module boundaries to automate compartmentalization of systems and enforce security policies, enhancing reliability and security. BREAKAPP transparently spawns modules in protected compartments while preserving their original...

متن کامل

Android Security Framework: Enabling Generic and Extensible Access Control on Android

We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of codebased security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security Modules or the BSD MAC Framework) and intertwines...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008