Challenges and experiences with applying microsoft threat modeling in agile development projects

DS Cruzes, MG Jaatun, K Bernsmed… - 2018 25th …, 2018 - ieeexplore.ieee.org
The goal of secure software engineering is to create software that keeps performing as
intended even when exposed to attacks. Threat modeling is considered to be a key activity …

[HTML][HTML] Influencing the security prioritisation of an agile software development project

IA Tøndel, DS Cruzes, MG Jaatun, G Sindre - Computers & Security, 2022 - Elsevier
Software security is a complex topic, and for development projects it can be challenging to
assess what security is necessary and cost-effective. Agile Software Development (ASD) …

Integrating security and privacy in software development

MT Baldassarre, VS Barletta, D Caivano… - Software Quality …, 2020 - Springer
As a consequence to factors such as progress made by the attackers, release of new
technologies and use of increasingly complex systems, and threats to applications security …

Towards agile cybersecurity risk management for autonomous software engineering teams

H Salin, M Lundgren - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
In this study, a framework was developed, based on a literature review, to help managers
incorporate cybersecurity risk management in agile development projects. The literature …

Measuring secure coding practice and culture: A finger pointing at the moon is not the moon

I Ryan, U Roedig, KJ Stol - 2023 IEEE/ACM 45th International …, 2023 - ieeexplore.ieee.org
Software security research has a core problem: it is impossible to prove the security of
complex software. A low number of known defects may simply indicate that the software has …

IoTSM: an end-to-end security model for IoT ecosystems

J Bugeja, B Vogel, A Jacobsson… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new
technologies. Alongside this development, most IoT devices are easy to compromise, as …

Privacy oriented software development

MT Baldassarre, VS Barletta, D Caivano… - Quality of Information and …, 2019 - Springer
Threats to applications security are continuously evolving thanks to factors such as progress
made by the attackers, release of new technologies, use of increasingly complex systems. In …

Infiltrating security into development: exploring the world's largest software security study

C Weir, S Migues, M Ware, L Williams - … of the 29th ACM Joint Meeting …, 2021 - dl.acm.org
Recent years have seen rapid increases in cybercrime. The use of effective software security
activities plays an important part in preventing the harm involved. Objective research on …

Agile team members perceptions on non-functional testing: influencing factors from an empirical study

CR Camacho, S Marczak… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Non-functional requirements define the overall qualities or attributes of a system. Although
important, they are often neglected for many reasons, such as pressure of time and budget …

[HTML][HTML] Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions

D Fucci, E Alégroth, M Felderer… - Journal of Systems and …, 2024 - Elsevier
Background: Recent years have seen a surge in cyber-attacks, which can be prevented or
mitigated using software security activities. OWASP SAMM is a maturity model providing a …