Reducing Software Security Risk through an Integrated Approach

نویسندگان

  • David P. Gilliam
  • John C. Kelly
  • Matt Bishop
چکیده

This paper discusses new joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis sponsored by the National Aeronautics and Space Administration to develop a security assessment instrument for the sojiware development and maintenance life cycle. The assessment instrument is a collection of tools and procedures to support development of secure sojiware. The toolset initially will have a Vulnerability Matrix (VMatrix) with severity, flequency, platford application, and signatureBela3 in a database keyed on the Computer Vulnerability Enumeration (CVE) number. The toolset also will include a property-based testing tool to slice sojiware code looking for specific vulnerabilities using signatures from the VMatrix. A third component of the research underlying this toolset will be an investigation into the verij&ation of sojiware designs for compliance to security properties. This is based on model checking approaches initially researched together with analytical verijkation of formal specification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Integrated Approach to Reducing Information Technology (IT) Security Risk in the Software Life Cycle A White Paper Proposal

1. Introduction Jet Propulsion Laboratory (JPL) was funded by the NASA Office of Safety and Mission Assurance (OSMA) with a Center Initiative, " Reducing Software Security Risk through an Integrated Approach " (RSSR). A partner on this initiative is the University of California at Davis (UC Davis). The Initiative is a formal approach to addressing Information Technology (IT) security through th...

متن کامل

The Development of an Integrated Psychotherapy Model based on Religious-Psychological Teachings with Islamic Approach and Evaluating its Effectiveness on Reducing the Tendency to High-Risk Behaviors in Adolescents

Objective: The aim of this study was to develop an integrated psychotherapy model based on religious-psychological teachings with Islamic approach and evaluate its effectiveness on reducing the tendency to high-risk behaviors (tendency to use alcohol, drug, and cigarette) in adolescents. Method: The present study was quasi-experimental with pretest-posttest design with a control group. The stat...

متن کامل

Using Software Security Analysis to Verify the Secure Socket Layer (SSL) Protocol

The National Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative “Reducing Software Security Risk (RSS...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

Automating Threat Modeling through the Software Development Life-Cycle

Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software development know this reality, and they have introduced risk assessment methodologies in their development processes. Unfortunately, these methodologies require engineers to have deep software security skills to carry out some of the most important steps of this process, a...

متن کامل

A Graph-Theoretic Visualization Approach to Network Risk Analysis

This paper describes a software system that provides significant new capabilities for visualization and analysis of network attack graphs produced through Topological Vulnerability Analysis (TVA). The TVA approach draws on a database of known exploits and system vulnerabilities to provide a connected graph representing possible cyber-attack paths within a given network. Our visualization approa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000