Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Bu 2006
DOI: 10.1145/1501434.1501486
|View full text |Cite
|
Sign up to set email alerts
|

Security hardening of open source software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2008
2008
2021
2021

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 1 publication
0
5
0
1
Order By: Relevance
“…For example, Cadariu et al [15] identified the need for automated known vulnerability detection, in particular with respect to external components and systems. In [16] Mourad et al identify security hardening as a possible concept to help developers and maintainers eliminate and prevent vulnerabilities and threats. Complementing the concept of Mourad et al the need for automation of security compliance checks was described by Ullah et al in [17].…”
Section: A Security Automationmentioning
confidence: 99%
“…For example, Cadariu et al [15] identified the need for automated known vulnerability detection, in particular with respect to external components and systems. In [16] Mourad et al identify security hardening as a possible concept to help developers and maintainers eliminate and prevent vulnerabilities and threats. Complementing the concept of Mourad et al the need for automation of security compliance checks was described by Ullah et al in [17].…”
Section: A Security Automationmentioning
confidence: 99%
“…Segundo [25], o processo de tornar o sistema operacional mais seguro do que o nível padrão de sua instalação,é conhecido como hardening. O conceito de hardening também foi adotado por autores para descrever métodos de aprimorar a segurança em softwares [26] e na camada de rede de uma organização [27]. Desta forma, o termo hardening,é utilizado para referenciar a melhoria em segurança de algum sistema, podendo ser um software, uma rede e seus dispositivos, assim como um sistema operacional.…”
Section: Hardeningunclassified
“…We defined in Mourad et al (2006) software security hardening as any process, methodology, product, or combination thereof that is used to add security functionalities and/or remove vulnerabilities or prevent their exploitation in existing software. Security hardening practices are usually applied manually by injecting security code into the software (Bishop, 2005;Howard and Le Blanc, 2002;Seacord, 2005;Wheeler, 2003).…”
Section: Security Hardening Approachmentioning
confidence: 99%