메뉴 건너뛰기




Volumn 18, Issue 1, 2009, Pages 8-25

Secure software engineering: Learning from the past to address future challenges

Author keywords

Metrics for software security; Secure software systems engineering; Security threats; Software security vulnerabilities

Indexed keywords


EID: 85009069580     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393550802623206     Document Type: Article
Times cited : (22)

References (56)
  • 1
    • 34250003707 scopus 로고    scopus 로고
    • The contemporary software security landscape
    • Ahmad, D. (2007). The contemporary software security landscape. IEEE Security and Privacy, 5(3), 75-77.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 75-77
    • Ahmad, D.1
  • 2
    • 26444516466 scopus 로고    scopus 로고
    • Security vulnerabilities in software systems: A quantitative perspective
    • Ihazmi, O., Malaiya, Y., and Ray, I. (2005, August). Security vulnerabilities in software systems: A quantitative perspective. Data and Applications Security XIX, 3654, 281-294.
    • (2005) Data and Applications Security , vol.19 , Issue.3654 , pp. 281-294
    • Ihazmi, O.1    Malaiya, Y.2    Ray, I.3
  • 6
    • 85025345098 scopus 로고    scopus 로고
    • Introduction to attack patterns. Us-cert: Build security in web site
    • Barnum, S. and Sethi, A. (2006). Introduction to attack patterns. US-CERT: Build security in Web site. Citigal. Available at https://buildsecu rityin. us-cert.gov/daisy/bsi/articles/knowledge/attack/585.html
    • (2006) Citigal
    • Barnum, S.1    Sethi, A.2
  • 7
    • 33747205462 scopus 로고    scopus 로고
    • On the brittleness of software and the infeasibility of security metrics
    • Bellovin, S. S. (2006). On the brittleness of software and the infeasibility of security metrics. IEEE Security and Privacy, 4(4), 96.
    • (2006) IEEE Security and Privacy , vol.4 , Issue.4 , pp. 96
    • Bellovin, S.S.1
  • 9
    • 85008047921 scopus 로고    scopus 로고
    • Software defect reduction top 10 list
    • Boehmand, B. W. and Basili, V. R. (2001). Software defect reduction top 10 list. IEEE Computer, 34(1), 135-137.
    • (2001) IEEE Computer , vol.34 , Issue.1 , pp. 135-137
    • Boehmand, B.W.1    Basili, V.R.2
  • 11
    • 85025335414 scopus 로고    scopus 로고
    • September), Technical report., Available at
    • MITRE Corporation. (2007, September). About CWE. Technical report. Available at http://cwe.mitre.org/about/index.html
    • (2007) About CWE
  • 12
    • 85025374488 scopus 로고    scopus 로고
    • Technical report. Available at
    • MITRE Corporation. (2007). CWE List (Draft 7). Technical report. Available at http://cwe.mitre.org/data/index.html
    • (2007) CWE List (Draft 7)
  • 13
    • 3042720722 scopus 로고    scopus 로고
    • Information security: Why the future belongs to the quants
    • Geer, D., Hoo, K.-S., and Jaquith, A. (2003). Information security: Why the future belongs to the quants. IEEE Security and Privacy, 1(4), 24-32.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4 , pp. 24-32
    • Geer, D.1    Hoo, K.-S.2    Jaquith, A.3
  • 14
    • 3042694356 scopus 로고    scopus 로고
    • Processes for producing secure software: Summary of us national cyber-security summit subgroup report
    • Davis, N., Humphrey, W., Redwine, S. T., Jr., Zibulski, G., and McGraw, G. (2004). Processes for producing secure software: Summary of us national cyber-security summit subgroup report. IEEE Security and Privacy, 2(3), 18-25.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 18-25
    • Davis, N.1    Humphrey, W.2    Redwine, S.T.3    Zibulski, G.4    McGraw, G.5
  • 15
    • 40249097816 scopus 로고    scopus 로고
    • Asasi: An environment for addressing software application security issues
    • Los Alamitos, CA. IEEE Computer Society
    • Essafi, M., Labed, L., and Ghezala, H. B. (2006). ASASI: An environment for addressing software application security issues. In International Conference on Systems and Networks Communications, p. 19, Los Alamitos, CA. IEEE Computer Society.
    • (2006) International Conference on Systems and Networks Communications , pp. 19
    • Essafi, M.1    Labed, L.2    Ghezala, H.B.3
  • 16
    • 77954726960 scopus 로고    scopus 로고
    • Engineering safety and security related requirements for software intensive systems
    • Los Alamitos, CA. IEEE Computer Society
    • Firesmith, D. G. (2007). Engineering safety and security related requirements for software intensive systems. In 29th International Conference on Software Engineering (ICSE'07Companion), p. 169, Los Alamitos, CA. IEEE Computer Society.
    • (2007) 29Th International Conference on Software Engineering (Icse'07companion) , pp. 169
    • Firesmith, D.G.1
  • 17
    • 33846166742 scopus 로고    scopus 로고
    • The potential for underinvestment in internet security: Implications for regulatory policy
    • Garcia, A. and Horowitz, B. (2007, February). The potential for underinvestment in Internet security: Implications for regulatory policy. Journal of Regulatory Economics, 31(1), 37-55.
    • (2007) Journal of Regulatory Economics , vol.31 , Issue.1 , pp. 37-55
    • Garcia, A.1    Horowitz, B.2
  • 19
    • 85008038652 scopus 로고    scopus 로고
    • Point/counterpoint
    • Hoglund, G. and McGraw, G. (2002). Point/counterpoint. IEEE Software, 19(6), 56-59.
    • (2002) IEEE Software , vol.19 , Issue.6 , pp. 56-59
    • Hoglund, G.1    McGraw, G.2
  • 21
    • 3042809894 scopus 로고    scopus 로고
    • Fourth quarter). Tangible roi through secure software engineering
    • Hoo, K.-S., Sudbury, A. W., and Jaquith, A. R. (2001, Fourth Quarter). Tangible ROI through secure software engineering. Secure Business Quarterly, 1(2).
    • (2001) Secure Business Quarterly , vol.1 , Issue.2
    • Hoo, K.-S.1    Sudbury, A.W.2    Jaquith, A.R.3
  • 23
    • 34547974467 scopus 로고    scopus 로고
    • Estimating software vulnerabilities
    • Jones, J. R. (2007). Estimating software vulnerabilities. IEEE Security and Privacy, 5(4), 28-32.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.4 , pp. 28-32
    • Jones, J.R.1
  • 24
    • 0004229237 scopus 로고    scopus 로고
    • PhD thesis, Purdue University, West Lafayette, IN
    • Krsul, I. V. (1998, May). Software vulnerability analysis. PhD thesis, Purdue University, West Lafayette, IN.
    • (1998) Software Vulnerability Analysis
    • Krsul, I.V.1
  • 26
    • 30344471832 scopus 로고    scopus 로고
    • Will proposed standards make mobile phones more secure?
    • Leavitt, N. (2005). Will proposed standards make mobile phones more secure? Computer, 38(12), 20-22.
    • (2005) Computer , vol.38 , Issue.12 , pp. 20-22
    • Leavitt, N.1
  • 27
    • 34547444679 scopus 로고    scopus 로고
    • July), Technical Report CMU-CS-05-1 55, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA
    • Manadhata, P. and Wing, J. M. (2005, July). An attack surface metric. Technical Report CMU-CS-05-1 55, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA.
    • (2005) An Attack Surface Metric.
    • Manadhata, P.1    Wing, J.M.2
  • 30
    • 85008014461 scopus 로고    scopus 로고
    • Software assurance for security
    • McGraw, G. (1999). Software assurance for security. Computer, 32(4), 103-105.
    • (1999) Computer , vol.32 , Issue.4 , pp. 103-105
    • McGraw, G.1
  • 31
    • 2342581753 scopus 로고    scopus 로고
    • From the ground up: The dimacs software security workshop
    • McGraw, G. (2003). From the ground up: The DIMACS software security workshop. IEEE Security and Privacy, 1(2), 59-66.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.2 , pp. 59-66
    • McGraw, G.1
  • 32
  • 33
    • 33144456824 scopus 로고    scopus 로고
    • Software security: Building security
    • Upper Saddle River, NJ: Addison- Wesley
    • McGraw, G. (2006). Software security: Building security. In: Addison- Wesley Software Security Series. Upper Saddle River, NJ: Addison- Wesley, pp.13-37, 277-298.
    • (2006) Addison- Wesley Software Security Series.
    • McGraw, G.1
  • 35
    • 34047178394 scopus 로고    scopus 로고
    • A metrics framework to drive application security improvement
    • Nichols, E. A. and Peterson, G. (2007). A metrics framework to drive application security improvement. IEEE Security and Privacy, 5(2), 88-91.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 88-91
    • Nichols, E.A.1    Peterson, G.2
  • 36
    • 0005914572 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. Retrieved January 12, 2009 from
    • NIST. National Vulnerability Database (NVD). (2007). Technical report, National Institute of Standards and Technology. Retrieved January 12, 2009 from http://nvd.nist. gov/statistics.cfm
    • (2007) Technical Report
  • 40
    • 0018683804 scopus 로고
    • Encryption and secure computer networks
    • Popek, G. P. and Kline, C. S. (1979). Encryption and secure computer networks. ACM Computing Surveys, 11(4), 331-356.
    • (1979) ACM Computing Surveys , vol.11 , Issue.4 , pp. 331-356
    • Popek, G.P.1    Kline, C.S.2
  • 41
    • 0005914572 scopus 로고    scopus 로고
    • Common Criteria Portal. CC-Common Criteria. (2007). Technical report. Available at http://www.commoncriteriaportal.org/public/developer/ index.php?menu=2
    • (2007) Technical Report
  • 42
    • 15944399929 scopus 로고    scopus 로고
    • (
    • Proceedings of the Fifth Annual IEEE SMC, June
    • Sachitano, A., Chapman, R. O., and Hamilton, J. A. (2004). Security in software architecture: A case study. In: Information Assurance Workshop, Proceedings of the Fifth Annual IEEE SMC, June, pages 370-376.
    • (2004) Information Assurance Workshop , pp. 370-376
    • Sachitano, A.1    Chapman, R.O.2    Hamilton, J.A.3
  • 43
    • 0036470012 scopus 로고    scopus 로고
    • Body of knowledge for software quality measurement
    • Schneidewind, N. F. (2002). Body of knowledge for software quality measurement. Computer, 35(2), 77-83.
    • (2002) Computer , vol.35 , Issue.2 , pp. 77-83
    • Schneidewind, N.F.1
  • 44
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • January
    • Sindre, G., and Opdahl, A. L. (2005, January). Eliciting security requirements with misuse cases. Requirements Engineering, 10(1), 34-44.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 46
    • 30344442772 scopus 로고    scopus 로고
    • Seven pernicious kingdoms: A taxonomy of software security errors
    • Tsipenyuk, K., Chess, B., and McGraw, G. (2005). Seven pernicious kingdoms: A taxonomy of software security errors. IEEE Security and Privacy, 3(6), 81-84.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 81-84
    • Tsipenyuk, K.1    Chess, B.2    McGraw, G.3
  • 47
    • 0005914572 scopus 로고    scopus 로고
    • US-CERT: United States Computer Emergency Readiness Team. Retrieved January 12, 2009 from
    • US-CERT. US-CERT Vulnerability Notes Database. (2007). Technical report, US-CERT: United States Computer Emergency Readiness Team. Retrieved January 12, 2009 from http://www.kb.cert.org/vuls/
    • (2007) Technical Report
  • 48
    • 27644524446 scopus 로고    scopus 로고
    • Bridging the gap between software development and information security
    • van Wyk, K. R. and McGraw, G. (2005). Bridging the gap between software development and information security. IEEE Security and Privacy, 3(5), 75-79.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5 , pp. 75-79
    • Van Wyk, K.R.1    McGraw, G.2
  • 49
    • 84870365725 scopus 로고    scopus 로고
    • Essential factors for successful software security awareness training
    • van Wyk, K. R. and Steven, J. (2006). Essential factors for successful software security awareness training. IEEE Security and Privacy, 4(5), 80-83.
    • (2006) IEEE Security and Privacy , vol.4 , Issue.5 , pp. 80-83
    • Van Wyk, K.R.1    Steven, J.2
  • 50
    • 4344569744 scopus 로고    scopus 로고
    • Risk analysis in software design
    • Verdon, D. and McGraw, G. (2004). Risk analysis in software design. IEEE Security and Privacy, 2(4), 79-84.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 79-84
    • Verdon, D.1    McGraw, G.2
  • 54
    • 3042826627 scopus 로고    scopus 로고
    • A call to action: Look beyond the horizon
    • Wing, J. M. (2003). A call to action: Look beyond the horizon. IEEE Security and Privacy, 1(6). 62-67.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.6 , pp. 62-67
    • Wing, J.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.