Properties for Security Measures of Software Products

نویسندگان

  • Yanguo Michael Liu
  • Issa Traoré
چکیده

A large number of attacks on computing systems succeed because of the existence of software flaws (e.g. buffer overflow, race conditions etc.) that could be fixed through a careful design process. An effective way of improving the quality of software products consists of using metrics to guide the development process. The field of software security metrics however is still in infancy in contrast with the area of traditional software metrics such as reliability metrics for which several key results have been obtained so far. We identify in this paper a number of internal software attributes that could be related to a variety of security qualities. Since theoretical validation is an important step in the development of any metrics program, we focus in this paper on studying the measurement properties associated with these internal attributes. The properties, based on popular security design principles in use in security engineering processes, can be used to guide the search of software security metrics. We study the feasibility of our theoretical framework by presenting case studies based on metrics derived from existing security measurement frameworks, namely the attack surface metrics system and the privilege graph paradigm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Advantage, Self-sufficiency and Food Security in Iran: Case Study of Wheat Commodity

Food security has a dynamic notion during the time and may be affected by various domestic and global factors.Nevertheless, Iranian policy makers consider food security as same as self-sufficiency in agricultural food products, particularly wheat production. However, self-sufficiency can contribute to food security only if it is in coincidences with comparative advantage and sustainable resourc...

متن کامل

An Overview of Threats and Security Software Solutions for Smartphones

The market of security software solutions for smartphones has grown considerably in the last years. A wide range of products is available. The objective of our paper is to develop an overview of security software solutions for smartphones. At first we identify typical threats and security measures for smartphones. Then we explore current security software solutions and describe how these can be...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

Determination of Adulteration and Authenticity of Meat and Meat Products Using Chemical Properties and PCR Technique in Tabriz

Background & objectives: Nowadays, consumers are demanding more accurate and clear food information than ever before, and meat products are no exception. Given the relatively high cost of raw meat, the possibility of adulteration is not unthinkable. The importance of detecting fraud meat products is due to the inclusion of other types of meat or cheap carcass components or the non-compliance of...

متن کامل

Solution for Virtualization to Ensure Optimal Network Security Environment

The Internet became widely diffused once the Internet Protocol (IP) was defined in an Internet technical standard, Request for Comments (RFC). Meanwhile, security measures were left insufficiently discussed. Given this situation, intruders disguised as normal communication can relatively easily penetrate and disrupt Internet services. Their methods of attacks are becoming more sophisticated on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007