Design of a Process for Software Security
2007 (English)In: Second International Conference on Availability, Reliability and Security, 2007, IEEE Computer Society, 2007, 301-309 p.Conference paper (Refereed)
Security is often an afterthought when developing software, and is often bolted on late in development or even during deployment or maintenance, through activities such as penetration testing, add-on security software and penetrate-and-patch maintenance. We believe that security needs to be built in to the software from the beginning, and that security activities need to take place throughout the software lifecycle. Accomplishing this effectively and efficiently requires structured approach combining a detailed understanding on what causes vulnerabilities, and how to prevent them. In this paper we present a process for software security that is based on vulnerability cause graphs, a formalism we have developed for modeling the causes of software vulnerabilities. The purpose of the software security process is to evolve the software development process so that vulnerabilities are prevented. The process we present differs from most current approaches to software security in its high degree of adaptability and in its ability to evolve in step with changing threats and risks. This paper focuses on how to apply the process and the criteria that have influenced the process design
Place, publisher, year, edition, pages
IEEE Computer Society, 2007. 301-309 p.
Software security, software process improvement
IdentifiersURN: urn:nbn:se:liu:diva-37683DOI: 10.1109/ARES.2007.67ISI: 000246485700037Local ID: 37345ISBN: 978-0-7695-2775-8ISBN: 0-7695-2775-2OAI: oai:DiVA.org:liu-37683DiVA: diva2:258532
Second International Conference on Availability, Reliability and Security (ARES 2007), 10-13 April 2007, Vienna, Austria