2020
DOI: 10.1109/access.2020.2989113
|View full text |Cite
|
Sign up to set email alerts
|

A Preventive Secure Software Development Model for a Software Factory: A Case Study

Abstract: The number of cyberattacks has greatly increased in in the last years, as well as their sophistication and impact. For this reason, new emerging software development models are demanded, which help in developing secure by default software. To achieve this, the analysis and comparison in depth of the current models of secure software development is especially important. In this paper, a review of the most popular secure software models is presented, and a new secure software methodology is proposed, adapted to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(30 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…During the software development process, majority of the security attacks are possible due to implementation flaws such as improper input validation [105], improper authentication and authorization mechanisms [106], improper session management [107], and other vulnerabilities such as Session-Id vulnerable or theft, incorrectly implemented logouts, lock failed attempts per browser session, peer-user session restriction, and log replay feature. All these mishaps compromise the application's intended functionality [11], [48], [108]. However, spoofing [109], tampering, repudiation [110], information disclosure, denial of services [111], elevation of privilege and failure to restrict uniform resource locator (URL) access are some of the most common security issues that hamper the process of secure authorization and authentication [76], [112], [113], [114], [115], [116], [117].…”
Section: Causes Of Software Vulnerabilitiesmentioning
confidence: 99%
See 4 more Smart Citations
“…During the software development process, majority of the security attacks are possible due to implementation flaws such as improper input validation [105], improper authentication and authorization mechanisms [106], improper session management [107], and other vulnerabilities such as Session-Id vulnerable or theft, incorrectly implemented logouts, lock failed attempts per browser session, peer-user session restriction, and log replay feature. All these mishaps compromise the application's intended functionality [11], [48], [108]. However, spoofing [109], tampering, repudiation [110], information disclosure, denial of services [111], elevation of privilege and failure to restrict uniform resource locator (URL) access are some of the most common security issues that hamper the process of secure authorization and authentication [76], [112], [113], [114], [115], [116], [117].…”
Section: Causes Of Software Vulnerabilitiesmentioning
confidence: 99%
“…Cross-site scripting, cross-site request forgery, format string problems, code and command injection, auto-complete attribute not enabled have been noted to be some of the software security risks in the deployment phase. On the other hand, software security risks in maintenance phase have been identified as POST change requests for GET, POST directives with invalidated parameters, as well as a database injection vulnerabilities [48], [93], [108], [118]- [123]. Here, incorrect input validation [124] refers to the lack of or incorrect substantiation of input provided by a user via the application's user interface.…”
Section: Causes Of Software Vulnerabilitiesmentioning
confidence: 99%
See 3 more Smart Citations