IEEE SecDev 2016: Prioritizing Secure Development

نویسندگان

  • Robert K. Cunningham
  • Pamela Gupta
  • Ulf Lindqvist
  • Stelios Sidiroglou
  • Michael Hicks
چکیده

D eveloping software in 2016 is different than it was when IEEE Security & Privacy magazine was founded in 2003. Developers now need to know about the constantly evolving threat landscape, the challenging complexity of systems security, and the accelerating pace of software and system development. Computer attacks in 2003 were rare enough that the term computer worms had to be defined when reported and taxonomies needed to be developed.1,2 Today’s threats are from well-funded militaries and companies with expertise in attacking systems, applications, and data, and the attacks are more varied and common. Back in 2003, Microsoft and Apple released a major OS update roughly every two years, and it took another year or two for it to be installed on the majority of systems. Today, a significant new OS version comes out almost every year, and the ability to share data and services across platforms like smartphones and smart watches is becoming ubiquitous. It’s clear that developers, researchers, and practitioners need a venue to discuss design approaches and tools for building security in and significantly reducing the introduction of vulnerabilities. Great progress is being made in the academic security research community, but research results don’t transition to the engineering and development communities to the necessary extent and at the necessary speed. To address this critical need, the IEEE Cybersecurity Initiative is introducing a new event that aims to expand interactions and bridge the gap between cybersecurity research and development: the IEEE Cybersecurity Development Conference (IEEE SecDev). The inaugural IEEE SecDev 2016 Conference will be held on 3–4 November 2016 in Boston.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Code Randomization: Haven't We Solved This Problem Yet?

Two decades since the idea of using software diversity for security was put forward, ASLR is the only technique to see widespread deployment. This is puzzling since academic security researchers have published scores of papers claiming to advance the state of the art in the area of code randomization. Unfortunately, these improved diversity techniques are generally less deployable than integrit...

متن کامل

IEEE Software and Professional Development

I’VE SUBSCRIBED to IEEE Software since it started in 1984. I’ve always liked its practical focus and that it covers all types of software from embedded systems to large business systems. It was, and maybe still is, the most readable and useful of the magazines trying to bridge the divide between researchers and practitioners. For the past few years, though, I haven’t found much I want to read i...

متن کامل

Managing a Software Business

Your Business Model and Strategy Start with your business model, the idea that describes how you create value. Will that be a pure software product, such as Microsoft Windows; a software–hardware combination (consider the iPhone); or a service, such as eBay? Having a service component in your offering lets you secure recurring revenue. However, you’ll also need to invest in and manage the opera...

متن کامل

Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks

Media independent information service is one of the important parts of the IEEE 802.21 standard to optimize vertical handover in wireless heterogeneous networks. In this paper, an anonymous network information acquirement protocol is proposed for a mobile user, which can be used to establish a secure channel between the mobile user and the information server. Security and performance analysis s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2016