Developing secure software and systems
2004
Abstract
Abstract: The development and maintenance of network and data security in software systems is done in a late phase of design and coding or during deployment, often in an ad-hoc manner. Network monitoring and recovery, encryption protocols, best practices for combating cyber-crime, or disaster recovery planning are useful methodologies applied to enforce security of a deployed system. Nevertheless these are not enough to protect from attacks directed to software vulnerabilities hidden at design and code level.
References (19)
- References
- Special Issue on security software, Software Practice and Experience, vol. 33, issue 5, 2003.
- Common Criteria. http://www.commoncriteria.org/
- T. Lodderstedt, D. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security", 5th International Conference on the Unified Modeling Language, 2002.
- The AspectJ Programming Guide, the AspectJ team, available at http://aspectj.org
- The Aspectc project, available at http://www.aspectc.org/
- J. Suzuki and Y. Yamamoto. "Extending UML with Aspects: Aspect Support in the Design Phase," In Proc. of the 3rd Aspect-Oriented Programming (AOP) Workshop at The 13th European Conference on Object Oriented Programming (ECOOP'99), Springer LNCS 1743, Lisbon, Portugal, June 1999.
- O. Aldawud, T. Elrad, and A. Bader, "A UML Profile for Aspect Oriented Modeling". OOPSLA 2001 workshop on Aspect Oriented Programming.
- R. Pawlak, L. Duchien, G. Florin, F. Legond-Aubry, L. Seinturier, and L. Martelli, "A UML Notation for Aspect-Oriented Software Design".
- M. M. Kandé, J. Kienzle, and A. Strohmeier, "From AOP to UML: Towards an Aspect-Oriented Architectural Modeling Approach".
- Third International Workshop on Aspect-Oriented Modeling. On-line at http://lglwww.epfl.ch/workshops/aosd2003/
- Tool for automatic J2EE deployment of secureUML: http://www.io- software.com/products/data/mda_security_factsheet_020902.pdf
- B. De Win, B. Vanhaute, and B. De Decker, "Security Through Aspect-Oriented Programming, Advances in Network and Distributed Systems Security". B. De Decker, F. Piessens, J. Smits and E. Van Herreweghen, eds. Kluwer Academic Publishers, 2001, pp. 125-138.
- M. Abadi, "Built-in Object Security", In proceedings of ECOOP 2003, Darmstadt, Germany, July 2003.
- J. Jürjens, "Model-based Security with UMLsec", UML Forum, Tokyo, April 2003.
- Splint homepage. http://www.splint.org/
- RATS tool, http://www.securesoftware.com/download_form_rats.htm
- D.A. Wheeler, Secure Programming for Linux and Unix. On-line at http://www.dwheeler.com/secure-programs/
- Autofocus homepage: http://autofocus.in.tum.de/index-e.html