Software Security Comprehension
نویسندگان
چکیده
Software security is becoming more and more important with the increasing number of applications and platforms connected to the Internet, for example, enterprise applications, smartphones or the iPad. The growing importance makes it a progressively interesting field for developers, software designers, end users, and enterprises. Fixing security bugs belongs to the traditional field of software maintainace what makes it also necessary to apply software-comprehension techniques. In the following we present our ongoing research on software-security comprehension, a first step towards program comprehension tailored to the needs of security experts.
منابع مشابه
Applying Software Transformation Techniques to Security Testing
Application protocols have become sophisticated enough that they have become languages in their own right. At the best of times, these protocols are difficult to implement correctly. Combining the complexity of these protocols with other development pressures such as time to market, limited processor power and/or demanding performance requirements make it even more difficult to produce implemen...
متن کاملSoftware Visualization Techniques for the Representation and Exploration of Execution Traces with a Focus on Program Comprehension Tasks
The analysis of execution traces can reveal important information about the behaviour of software. This information can in turn be used to help with a variety of software engineering applications including software maintenance, performance analysis, and software security. Traces, however, tend to be extremely large. Various visualization techniques have been proposed to help software engineers ...
متن کاملTAGGINGSENSE: Method Based On Sensemaking For Object-Oriented Source Code Comprehension
All software requires maintenance, either for error correction or for implementing updates. However, maintenance is often complex and expensive, and one of the main problems in the high cost of maintenance is the difficulty of understanding the source code of other authors. Thus, this research presents TaggingSense, a method based on sensemaking that aims to reduce object-oriented source code c...
متن کاملContemporary Security and Private Security Companies: Privatization of Security and Consequences
With the end of the Cold War and the corresponding shift in military doctrine, the structure and deployment of national armed forces, as well as the core change in comprehension of (inter-)/national security and (inter-)/national security threats, the role of private security providers gained a new momentum. The increased involvement of private military security companies in the provision of pr...
متن کاملPersona Security: A Technique for Supporting the Elicitation of Security Requirements
Safety-critical embedded systems have assisted people in the execution of daily tasks, causing a search for security approaches in the initial phases of the development. The elicitation of security requirements in such systems is a key element for the definition of secure software. Nonetheless, security requirements are mostly ambiguous, incomplete or even not considered, which may be the reaso...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Softwaretechnik-Trends
دوره 31 شماره
صفحات -
تاریخ انتشار 2011