Software Security Comprehension

نویسندگان

  • Bernhard J. Berger
  • Michaela Bunke
چکیده

Software security is becoming more and more important with the increasing number of applications and platforms connected to the Internet, for example, enterprise applications, smartphones or the iPad. The growing importance makes it a progressively interesting field for developers, software designers, end users, and enterprises. Fixing security bugs belongs to the traditional field of software maintainace what makes it also necessary to apply software-comprehension techniques. In the following we present our ongoing research on software-security comprehension, a first step towards program comprehension tailored to the needs of security experts.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying Software Transformation Techniques to Security Testing

Application protocols have become sophisticated enough that they have become languages in their own right. At the best of times, these protocols are difficult to implement correctly. Combining the complexity of these protocols with other development pressures such as time to market, limited processor power and/or demanding performance requirements make it even more difficult to produce implemen...

متن کامل

Software Visualization Techniques for the Representation and Exploration of Execution Traces with a Focus on Program Comprehension Tasks

The analysis of execution traces can reveal important information about the behaviour of software. This information can in turn be used to help with a variety of software engineering applications including software maintenance, performance analysis, and software security. Traces, however, tend to be extremely large. Various visualization techniques have been proposed to help software engineers ...

متن کامل

TAGGINGSENSE: Method Based On Sensemaking For Object-Oriented Source Code Comprehension

All software requires maintenance, either for error correction or for implementing updates. However, maintenance is often complex and expensive, and one of the main problems in the high cost of maintenance is the difficulty of understanding the source code of other authors. Thus, this research presents TaggingSense, a method based on sensemaking that aims to reduce object-oriented source code c...

متن کامل

Contemporary Security and Private Security Companies: Privatization of Security and Consequences

With the end of the Cold War and the corresponding shift in military doctrine, the structure and deployment of national armed forces, as well as the core change in comprehension of (inter-)/national security and (inter-)/national security threats, the role of private security providers gained a new momentum. The increased involvement of private military security companies in the provision of pr...

متن کامل

Persona Security: A Technique for Supporting the Elicitation of Security Requirements

Safety-critical embedded systems have assisted people in the execution of daily tasks, causing a search for security approaches in the initial phases of the development. The elicitation of security requirements in such systems is a key element for the definition of secure software. Nonetheless, security requirements are mostly ambiguous, incomplete or even not considered, which may be the reaso...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Softwaretechnik-Trends

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2011