A preliminary structure of software security assurance model

Author(s):  
Rafiq Ahmad Khan ◽  
Siffat Ullah Khan
Author(s):  
Changbok Jang ◽  
Jeongseok Kim ◽  
Hyokyung Jang ◽  
Sundo Park ◽  
Bokman Jang ◽  
...  

Author(s):  
Navneet Bhatt ◽  
Adarsh Anand ◽  
V. S. S. Yadavalli ◽  
Vijay Kumar

With the association of software security assurance in the development of code based systems; software developers are relying on the Vulnerability discovery models to mitigate the breaches by estimating the total number of vulnerabilities, before they’re exploited by the intruders. Vulnerability Discovery Models (VDMs) provide the quantitative classification of the flaws that exists in a software that will be discovered after a software is released. In this paper, we develop a vulnerability discovery model that accumulate the vulnerabilities due to the influence of previously discovered vulnerabilities. We further evaluate the proportion of previously discovered vulnerabilities along with the fraction additional vulnerabilities detected. The quantification methodology presented in this article has been accompanied with an empirical illustration on popular operating systems’ vulnerability data.


2007 ◽  
Author(s):  
Karen M. Goertzel ◽  
Theodore Winograd ◽  
Holly L. McKinley ◽  
Lyndon J. Oh ◽  
Michael Colon ◽  
...  

2020 ◽  
Vol 6 (1) ◽  
Author(s):  
Charles Weir ◽  
Awais Rashid ◽  
James Noble

Abstract Development teams are increasingly expected to deliver secure code, but how can they best achieve this? Traditional security practice, which emphasizes ‘telling developers what to do’ using checklists, processes and errors to avoid, has proved difficult to introduce. From analysis of industry interviews with a dozen experts in app development security, we find that secure development requires ‘dialectic’: a challenging dialog between the developers and a range of counterparties, continued throughout the development cycle. Analysing a further survey of 16 industry developer security advocates, we identify the six assurance techniques that are most effective at achieving this dialectic in existing development teams, and conclude that the introduction of these techniques is best driven by the developers themselves. Concentrating on these six assurance techniques, and the dialectical interactions they involve, has the potential to increase the security of development activities and thus improve software security for everyone.


Sign in / Sign up

Export Citation Format

Share Document