Exploring software security approaches in software development lifecycle: A systematic mapping study
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …
activities, such as requirements, design and implementation. The objective of this paper is to …
A systematic review and analytical evaluation of security requirements engineering approaches
Security is an inevitable concern in today's scenario of software-based application's
pervasiveness and development practices. Researchers and practitioners frequently …
pervasiveness and development practices. Researchers and practitioners frequently …
A preventive secure software development model for a software factory: a case study
JCS Núñez, AC Lindo, PG Rodríguez - IEEE Access, 2020 - ieeexplore.ieee.org
The number of cyberattacks has greatly increased in in the last years, as well as their
sophistication and impact. For this reason, new emerging software development models are …
sophistication and impact. For this reason, new emerging software development models are …
Integrating software development security activities with agile methodologies
H Keramati… - 2008 IEEE/ACS …, 2008 - ieeexplore.ieee.org
Because of several vulnerabilities in software products and high amount of damage caused
by them, software developers are enforced to produce more secure systems. Software grows …
by them, software developers are enforced to produce more secure systems. Software grows …
Engineering security into distributed systems: A survey of methodologies
A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …
software distribution as a central computing paradigm. This has been accompanied by a …
IoTSM: an end-to-end security model for IoT ecosystems
The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new
technologies. Alongside this development, most IoT devices are easy to compromise, as …
technologies. Alongside this development, most IoT devices are easy to compromise, as …
Ten principles for living models-a manifesto of change-driven software engineering
R Breu - 2010 International Conference on Complex, Intelligent …, 2010 - ieeexplore.ieee.org
The new generation of open networked IT systems poses particular challenges to software
engineering due to their evolving nature and their high quality requirements. In particular …
engineering due to their evolving nature and their high quality requirements. In particular …
Evaluation of static analysis tools for software security
HH AlBreiki, QH Mahmoud - 2014 10th International …, 2014 - ieeexplore.ieee.org
Security has been always treated as an add-on feature in the software development
lifecycle, and addressed by security professionals using firewalls, proxies, intrusion …
lifecycle, and addressed by security professionals using firewalls, proxies, intrusion …
[HTML][HTML] Fatal injection: A survey of modern code injection attack countermeasures
D Mitropoulos, D Spinellis - PeerJ Computer Science, 2017 - peerj.com
With a code injection attack (CIA) an attacker can introduce malicious code into a computer
program or system that fails to properly encode data that comes from an untrusted source. A …
program or system that fails to properly encode data that comes from an untrusted source. A …
Secure software development methodologies: a multivocal literature review
A Kudriavtseva, O Gadyatskaya - arXiv preprint arXiv:2211.16987, 2022 - arxiv.org
In recent years, the number of cyber attacks has grown rapidly. An effective way to reduce
the attack surface and protect software is adoption of methodologies that apply security at …
the attack surface and protect software is adoption of methodologies that apply security at …