Course Modules for Software Security
نویسندگان
چکیده
Each year the reported number of security vulnerabilities increases as does the sophistication of attacks to exploit these vulnerabilities. Most security vulnerabilities are the result of insecure coding practices. There is a critical need to increase the security education of computer science students, particularly in software security. We are designing course modules, to be used at the undergraduate or graduate level, to integrate software system security into our computer science curriculum. The course modules we have developed, and are developing, include: operating system security, software security testing, code review, risk analysis, and database security. Each course module includes lecture materials, inclass demonstrations, and hands-on assignments. These course modules are designed to be integrated into existing courses. The software security testing and database security modules were taught at this university in the Fall 2007 semester and received positive feedback from student surveys and questionnaires. The other modules will be taught in the Spring 2008 semester. Future work will include the development of more topics in these modules and the creation of new modules in secure software development. Index terms – Secure Software Engineering, Risk Analysis, Code Review, Operating System Security, Database Security, Secure Software Testing
منابع مشابه
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base
In this paper we propose Sancus, a security architecture for networked embedded devices. Sancus supports extensibility in the form of remote (even third-party) software installation on devices while maintaining strong security guarantees. More specifically, Sancus can remotely attest to a software provider that a specific software module is running uncompromised, and can authenticate messages f...
متن کاملSecurity Implications of Hardware vs. Software Cryptographic Modules
Cryptographic modules can be implemented either by hardware or by software. Whereas software implementations are known for being easier to develop and to maintain, when it comes to cryptographic modules or security-related applications in general, software implementations are significantly less secure than their hardware equivalents. The reason for this is mostly the fact that software solution...
متن کاملLinux Security Module Framework
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly endless stream of software security vulnerabilities. Security research has produced numerous access control mechanisms that help improve system security; however, there is little consensus on the best solution. Many powerful security systems have been implemented as research prototypes or highly sp...
متن کاملBreakApp: Automated, Flexible Application Compartmentalization
Developers of large-scale software systems may use third-party modules to reduce costs and accelerate release cycles, at some risk to safety and security. BREAKAPP exploits module boundaries to automate compartmentalization of systems and enforce security policies, enhancing reliability and security. BREAKAPP transparently spawns modules in protected compartments while preserving their original...
متن کاملAndroid Security Framework: Enabling Generic and Extensible Access Control on Android
We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of codebased security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security Modules or the BSD MAC Framework) and intertwines...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008