2020
DOI: 10.1007/978-3-030-52243-8_37
|View full text |Cite
|
Sign up to set email alerts
|

Recommendations for Effective Security Assurance of Software-Dependent Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…However, for many critical systems for which assurance is needed, adaptability and flexibility may not be possible to the highest degree. 4 These factors call for more flexible, easier to evolve, and adaptable architectures and designs for critical software systems to support assurance efforts, and recent research has started exploring this direction. [5][6][7] The Development of Incremental Assurance Solutions…”
Section: Toward More Flexible Evolvable and Adaptable Architecturesmentioning
confidence: 99%
“…However, for many critical systems for which assurance is needed, adaptability and flexibility may not be possible to the highest degree. 4 These factors call for more flexible, easier to evolve, and adaptable architectures and designs for critical software systems to support assurance efforts, and recent research has started exploring this direction. [5][6][7] The Development of Incremental Assurance Solutions…”
Section: Toward More Flexible Evolvable and Adaptable Architecturesmentioning
confidence: 99%
“…While security metrics can help with providing a sense of security, strong security assurance requires a thorough understanding of the security requirements, threats, and controls so that they can be incorporated at all stages of development [Jas20].…”
Section: Motivationmentioning
confidence: 99%
“…As the systems we rely upon continue to grow in size and complexity, security becomes an increasingly desired system trait. Unfortunately, security is often only retrofitted or "bolted-on" to many of the systems that we build [Jas20c]. This can lead to systems with inadequate security solutions, security solutions that feel disjointed or conflicted from the rest of the system architecture, and higher maintenance costs due to increased amounts of patching required to close holes in the system's defenses.…”
Section: Contextmentioning
confidence: 99%
“…The presence of oversights is also emblematic of this issue, as their presence effectively increases how many direct interactions are in the system, and therefore the complexity of the system, without contributing to the system's objectives. Dealing with size and complexity is one of the major challenges faced in providing adequate security assurance at the time of writing, as a complete view of all agents and possible interactions is often out of reach for large systems [Jas20c]. While a system designer needs to do their best to account for every possible vulnerability, an attacker only needs to find one vulnerability (e.g., an implicit interaction they can exploit) to potentially have a major impact on that system's ability to achieve its objectives.…”
Section: Complexitymentioning
confidence: 99%