2011
DOI: 10.1007/978-3-642-19125-1_12
|View full text |Cite
|
Sign up to set email alerts
|

An Architecture-Centric Approach to Detecting Security Patterns in Software

Abstract: Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security. Therefore, when designing software, security should be built in from the beginning, for example, by using security patterns. Utilizing security patterns already improves the security of software in early software development stages. In this paper, we show how to detect security patterns in code with the help of a reverse engineering… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…We assume that this binding cannot be detected with static analysis or is bundled with other patterns which partly cover these security patterns. Furthermore, other problems concerning security patterns were identified and must be solved prior to a mature recognition process [27]. 6) Conclusions of the Case Study: In summary, we conclude that the Bauhaus tool helped us during the review process.…”
Section: ) Issuesmentioning
confidence: 80%
“…We assume that this binding cannot be detected with static analysis or is bundled with other patterns which partly cover these security patterns. Furthermore, other problems concerning security patterns were identified and must be solved prior to a mature recognition process [27]. 6) Conclusions of the Case Study: In summary, we conclude that the Bauhaus tool helped us during the review process.…”
Section: ) Issuesmentioning
confidence: 80%
“…Few report post-implementation phases such as "Maintenance" and "Evolution," suggesting that security pattern research in later phases may be a frontier field. Cutting-edge topics include pattern classification [16], pattern detection from the source code [41], improvement of legacy systems using security patterns [10], and security patterns for operation dynamics [181]. In contrast, classifying patterns for the system lifecycle, defining patterns that respond to dynamic behaviors, and utilizing defined patterns in existing systems are topics that should be further examined.…”
Section: Topicmentioning
confidence: 99%
“…have introduced the security patterns, claiming their functions to contribute to security in various levels of architecture‐driven development. They have proposed an approach to detecting such patterns within the program code by using reverse engineering processes .…”
Section: Literature Reviewmentioning
confidence: 99%