2009
DOI: 10.1080/19393550802623206
|View full text |Cite
|
Sign up to set email alerts
|

Secure Software Engineering: Learning from the Past to Address Future Challenges

Abstract: This paper provides a taxonomy of secure software systems engineering (SSE) by surveying and organizing relevant SSE research and presents current trends in SSE, on-going challenges, and models for reasoning about threats and vulnerabilities. Several challenging questions related to risk assessment/mitigation (e.g., "what is the likelihood of attack") as well as practical questions (e.g., "where do vulnerabilities originate" and "how can vulnerabilities be prevented") are addressed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
21
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 21 publications
(21 citation statements)
references
References 38 publications
(64 reference statements)
0
21
0
Order By: Relevance
“…The sigmoidal growth model cannot, however, explain the impact of such security engineering practices upon the post-release growth of security vulnerabilities. In other words, historical analysis with postmortem variables cannot explain what happened before the software product entered a given market (Hein and Saiedian, 2009). This is another limitation for practical applications.…”
Section: Applicationsmentioning
confidence: 98%
See 1 more Smart Citation
“…The sigmoidal growth model cannot, however, explain the impact of such security engineering practices upon the post-release growth of security vulnerabilities. In other words, historical analysis with postmortem variables cannot explain what happened before the software product entered a given market (Hein and Saiedian, 2009). This is another limitation for practical applications.…”
Section: Applicationsmentioning
confidence: 98%
“…By assumption, the overall reliability and, hence, security are both bounded and increasing functions of time. Second, the model operates in the post-release context, using a so-called postmortem variable (Hein and Saiedian, 2009) to evaluate the trends during the servicing stage in Fig. 1.…”
Section: 3mentioning
confidence: 99%
“…The treatment of security threats in the earlier phases of system development reduces overall development cost because of the absence of a variety of vulnerabilities. These security improvements also indirectly translate into operational cost savings because less time and money are wasted recovering from attacks enabled by software security vulnerabilities .…”
Section: Introductionmentioning
confidence: 99%
“…P. BEDI ET AL. cost savings because less time and money are wasted recovering from attacks enabled by software security vulnerabilities [4].The proposed model is three-phased. Identification of threats is the function of the first phase.…”
mentioning
confidence: 99%
See 1 more Smart Citation