首页 > 最新文献

Int. J. Syst. Softw. Secur. Prot.最新文献

英文 中文
Improving Effectiveness of Process Model Matchers Using Wordnet Glosses 使用Wordnet Glosses提高进程模型匹配器的有效性
Pub Date : 2019-07-01 DOI: 10.4018/ijsssp.2019070101
M. Abdelkader
Process model matching is a key activity in many business process management tasks. It is an activity that consists of detecting an alignment between process models by finding similar activities in two process models. This article proposes a method based on WordNet glosses to improve the effectiveness of process model matchers. The proposed method is composed of three steps. In the first step, all activities of the two BPs are extracted. Second, activity labels are expanded using word glosses and finally, similar activities are detected using the cosine similarity metric. Two experiments were conducted on well-known datasets to validate the effectiveness of the proposed approach. In the first one, an alignment is computed using the cosine similarity metric only and without a process of expansion. While, in the second experiment, the cosine similarity metric is applied to the expanded activities using glosses. The results of the experiments were promising and show that expanding activities using WordNet glosses improves the effectiveness of process model matchers.
流程模型匹配是许多业务流程管理任务中的关键活动。它是一种活动,通过在两个流程模型中找到相似的活动来检测流程模型之间的一致性。本文提出了一种基于WordNet注释的方法来提高过程模型匹配器的有效性。该方法分为三个步骤。在第一步中,提取两个bp的所有活动。其次,使用单词光泽扩展活动标签,最后使用余弦相似度度量检测相似活动。在已知的数据集上进行了两个实验来验证所提出方法的有效性。在第一种方法中,只使用余弦相似度度量来计算对齐,而不需要展开过程。而在第二个实验中,余弦相似度度量被应用于使用光泽的扩展活动。实验结果表明,使用WordNet gloss扩展活动可以提高过程模型匹配器的有效性。
{"title":"Improving Effectiveness of Process Model Matchers Using Wordnet Glosses","authors":"M. Abdelkader","doi":"10.4018/ijsssp.2019070101","DOIUrl":"https://doi.org/10.4018/ijsssp.2019070101","url":null,"abstract":"Process model matching is a key activity in many business process management tasks. It is an activity that consists of detecting an alignment between process models by finding similar activities in two process models. This article proposes a method based on WordNet glosses to improve the effectiveness of process model matchers. The proposed method is composed of three steps. In the first step, all activities of the two BPs are extracted. Second, activity labels are expanded using word glosses and finally, similar activities are detected using the cosine similarity metric. Two experiments were conducted on well-known datasets to validate the effectiveness of the proposed approach. In the first one, an alignment is computed using the cosine similarity metric only and without a process of expansion. While, in the second experiment, the cosine similarity metric is applied to the expanded activities using glosses. The results of the experiments were promising and show that expanding activities using WordNet glosses improves the effectiveness of process model matchers.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134323349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing Sound Security Metrics 设计可靠的安全指标
Pub Date : 2019-01-01 DOI: 10.4018/ijsssp.2019010101
George Yee
This article begins with an introduction to security metrics, describing the need for security metrics, followed by a discussion of the nature of security metrics, including the challenges found with some security metrics used in the past. The article then discusses what makes a sound security metric and proposes a rigorous step-by-step method that can be applied to design sound security metrics, and to test existing security metrics to see if they are sound metrics. This is followed by a discussion of the feasibility of having scientifically-based security metrics and whether or not such metrics are sound. Application examples are included to illustrate the design and testing of sound security metrics.
本文首先介绍了安全度量,描述了对安全度量的需求,然后讨论了安全度量的本质,包括过去使用的一些安全度量所遇到的挑战。然后,本文讨论了什么是可靠的安全性度量,并提出了一种严格的分步方法,该方法可用于设计可靠的安全性度量,并测试现有的安全性度量以确定它们是否是可靠的度量。然后讨论采用基于科学的安全度量的可行性,以及这些度量是否合理。包括应用程序示例,以说明合理安全度量的设计和测试。
{"title":"Designing Sound Security Metrics","authors":"George Yee","doi":"10.4018/ijsssp.2019010101","DOIUrl":"https://doi.org/10.4018/ijsssp.2019010101","url":null,"abstract":"This article begins with an introduction to security metrics, describing the need for security metrics, followed by a discussion of the nature of security metrics, including the challenges found with some security metrics used in the past. The article then discusses what makes a sound security metric and proposes a rigorous step-by-step method that can be applied to design sound security metrics, and to test existing security metrics to see if they are sound metrics. This is followed by a discussion of the feasibility of having scientifically-based security metrics and whether or not such metrics are sound. Application examples are included to illustrate the design and testing of sound security metrics.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126546284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Software System Protection Scheme Based on Behavior and Context Monitoring 一种基于行为和上下文监控的软件系统保护方案
Pub Date : 2019-01-01 DOI: 10.4018/ijsssp.2019010102
Shen Fu, Mathew L. Wymore, Ting-Wei Chang, D. Qiao
The restriction of access to software systems is more important than ever. Yet, most primary authentication methods are still largely based on passwords, which are vulnerable to various attacks such as phishing scams and keyloggers. Advanced methods of behavior-based authentication exist, but most are platform-specific and are not generally applicable. In this article, the authors propose a generic continuous authentication scheme for software systems, which supplements existing authentication schemes and works as an auxiliary layer to provide additional protection against impostors. The kernel of their scheme is a novel monitoring engine that detects impostors in real-time based on behavior and context information. The authors evaluate their scheme on a dataset consisting of real users' historical records provided by their industrial partner, and the results demonstrate that the approach achieves a high classification accuracy with only a short delay in detection, allowing for real-time, continuous authentication.
对软件系统访问的限制比以往任何时候都更加重要。然而,大多数主要的身份验证方法仍然主要基于密码,这很容易受到各种攻击,如网络钓鱼骗局和键盘记录器。存在基于行为的高级身份验证方法,但大多数都是特定于平台的,并不普遍适用。在本文中,作者提出了一种通用的软件系统连续认证方案,它补充了现有的认证方案,并作为辅助层提供额外的保护,防止冒名顶替者。他们的方案的核心是一个新的监控引擎,可以根据行为和上下文信息实时检测冒名顶替者。作者在由其工业合作伙伴提供的真实用户历史记录组成的数据集上评估了他们的方案,结果表明该方法在检测延迟短的情况下实现了高分类精度,允许实时,连续认证。
{"title":"A Novel Software System Protection Scheme Based on Behavior and Context Monitoring","authors":"Shen Fu, Mathew L. Wymore, Ting-Wei Chang, D. Qiao","doi":"10.4018/ijsssp.2019010102","DOIUrl":"https://doi.org/10.4018/ijsssp.2019010102","url":null,"abstract":"The restriction of access to software systems is more important than ever. Yet, most primary authentication methods are still largely based on passwords, which are vulnerable to various attacks such as phishing scams and keyloggers. Advanced methods of behavior-based authentication exist, but most are platform-specific and are not generally applicable. In this article, the authors propose a generic continuous authentication scheme for software systems, which supplements existing authentication schemes and works as an auxiliary layer to provide additional protection against impostors. The kernel of their scheme is a novel monitoring engine that detects impostors in real-time based on behavior and context information. The authors evaluate their scheme on a dataset consisting of real users' historical records provided by their industrial partner, and the results demonstrate that the approach achieves a high classification accuracy with only a short delay in detection, allowing for real-time, continuous authentication.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122209960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis on Opinion Words Extraction in Electronic Product Reviews 电子产品评论中的意见词提取分析
Pub Date : 2019-01-01 DOI: 10.4018/ijsssp.2019010103
Sint Sint Aung
Online user reviews are increasingly becoming important for measuring the quality of different products and services. Sentiment classification or opinion mining involves studying and building a system that collects data from online and examines the opinions. Sentiment classification is also defined as opinion extraction as the computational research area of subjective information towards different products. Opinion mining or sentiment classification has attracted in many research areas because of its usefulness in natural language processing and other area of applications. Extracting opinion words and product features are also important tasks in opinion mining. In this work an unsupervised approach was proposed to extract opinions and product features without training examples. To obtain the dependency relation between the product aspects and opinions, this work used StanfordCoreNLP dependency parser. From these relations, rules are predified to extract product and opinions. The main advantage of this approach is that there is no need for training data and it has domain independence. Acoording to the experimental results, the modified algorithm gets better results than the double propagation algorithm.
在线用户评论对于衡量不同产品和服务的质量越来越重要。情感分类或意见挖掘涉及研究和建立一个系统,从网上收集数据并检查意见。情感分类也被定义为意见提取,作为对不同产品的主观信息的计算研究领域。观点挖掘或情感分类因其在自然语言处理和其他领域的应用而受到许多研究领域的关注。意见词和产品特征的提取也是意见挖掘的重要内容。在这项工作中,提出了一种无监督的方法来提取意见和产品特征,而不需要训练样例。为了获得产品方面和意见之间的依赖关系,本工作使用了StanfordCoreNLP依赖解析器。从这些关系中,预设规则,提取产品和意见。该方法的主要优点是不需要训练数据,并且具有领域独立性。实验结果表明,改进后的算法比双传播算法效果更好。
{"title":"Analysis on Opinion Words Extraction in Electronic Product Reviews","authors":"Sint Sint Aung","doi":"10.4018/ijsssp.2019010103","DOIUrl":"https://doi.org/10.4018/ijsssp.2019010103","url":null,"abstract":"Online user reviews are increasingly becoming important for measuring the quality of different products and services. Sentiment classification or opinion mining involves studying and building a system that collects data from online and examines the opinions. Sentiment classification is also defined as opinion extraction as the computational research area of subjective information towards different products. Opinion mining or sentiment classification has attracted in many research areas because of its usefulness in natural language processing and other area of applications. Extracting opinion words and product features are also important tasks in opinion mining. In this work an unsupervised approach was proposed to extract opinions and product features without training examples. To obtain the dependency relation between the product aspects and opinions, this work used StanfordCoreNLP dependency parser. From these relations, rules are predified to extract product and opinions. The main advantage of this approach is that there is no need for training data and it has domain independence. Acoording to the experimental results, the modified algorithm gets better results than the double propagation algorithm.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123995311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure MANET Routing Protocol for Crisis Situations 危机情况下安全的MANET路由协议
Pub Date : 2018-10-01 DOI: 10.4018/IJSSSP.2018100102
M. Jaatun, Åsmund Ahlmann Nyre, Inger Anne Tøndel
Emergency and rescue operations are often carried out in areas where the network infrastructure cannot be relied on for message exchange between first responders. Since a fundamental feature of a Mobile Ad Hoc Network is the ability to operate independently of existing infrastructure, it is deemed a well-suited solution to first responders scenarios. In this article, the authors describe a security extension to the OLSR routing protocol specifically designed for first responder scenarios. The proposed protocol provides node authentication and access control using asymmetric encryption and digital certificates, and also offers a secure group communication scheme. A link encryption scheme is devised to allow for efficient encryption of data even in broadcast mode, without the need for a network-wide shared key. By utilising pairwise symmetric keys for link confidentiality, the authors' solution is both efficient and scalable.
紧急和救援行动通常是在无法依靠网络基础设施进行第一响应者之间信息交换的地区进行的。由于移动自组织网络的一个基本特征是能够独立于现有基础设施运行,因此它被认为是一个非常适合第一响应者场景的解决方案。在本文中,作者描述了专为第一响应者场景设计的OLSR路由协议的安全扩展。该协议采用非对称加密和数字证书提供节点认证和访问控制,并提供安全的组通信方案。链路加密方案被设计为允许在广播模式下对数据进行有效加密,而不需要网络范围的共享密钥。通过使用成对对称密钥进行链路机密性,作者的解决方案既高效又可扩展。
{"title":"A Secure MANET Routing Protocol for Crisis Situations","authors":"M. Jaatun, Åsmund Ahlmann Nyre, Inger Anne Tøndel","doi":"10.4018/IJSSSP.2018100102","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018100102","url":null,"abstract":"Emergency and rescue operations are often carried out in areas where the network infrastructure cannot be relied on for message exchange between first responders. Since a fundamental feature of a Mobile Ad Hoc Network is the ability to operate independently of existing infrastructure, it is deemed a well-suited solution to first responders scenarios. In this article, the authors describe a security extension to the OLSR routing protocol specifically designed for first responder scenarios. The proposed protocol provides node authentication and access control using asymmetric encryption and digital certificates, and also offers a secure group communication scheme. A link encryption scheme is devised to allow for efficient encryption of data even in broadcast mode, without the need for a network-wide shared key. By utilising pairwise symmetric keys for link confidentiality, the authors' solution is both efficient and scalable.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Security Patterns to Develop Secure Systems - Ten Years Later 使用安全模式开发安全系统——十年后
Pub Date : 2018-10-01 DOI: 10.4018/IJSSSP.2018100103
E. Fernández, H. Washizaki, Nobukazu Yoshioka
The authors describe continuing work on the use of patterns in the development of secure systems. This work started as collaboration among five research centers on three continents and continues with a reduced number of involved researchers. Patterns are applied to all aspects of development, from domain analysis and attack modeling to basic design, and to all aspects of the systems under development, from the database and infrastructure to policies, monitoring, and forensics. The article provides an overview of a method of development involving the full range of patterns and describes recent contributions from some of the research threads being pursued within the collaboration.
作者描述了在安全系统开发中使用模式的持续工作。这项工作开始于三大洲五个研究中心之间的合作,并在参与研究人员数量减少的情况下继续进行。模式应用于开发的所有方面,从领域分析和攻击建模到基本设计,以及正在开发的系统的所有方面,从数据库和基础设施到策略、监视和取证。本文概述了一种涉及所有模式的开发方法,并描述了合作中正在进行的一些研究线程的最新贡献。
{"title":"Using Security Patterns to Develop Secure Systems - Ten Years Later","authors":"E. Fernández, H. Washizaki, Nobukazu Yoshioka","doi":"10.4018/IJSSSP.2018100103","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018100103","url":null,"abstract":"The authors describe continuing work on the use of patterns in the development of secure systems. This work started as collaboration among five research centers on three continents and continues with a reduced number of involved researchers. Patterns are applied to all aspects of development, from domain analysis and attack modeling to basic design, and to all aspects of the systems under development, from the database and infrastructure to policies, monitoring, and forensics. The article provides an overview of a method of development involving the full range of patterns and describes recent contributions from some of the research threads being pursued within the collaboration.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Robust and Lightweight Key Management Protocol for WSNs in Distributed IoT Applications 分布式物联网应用中wsn的鲁棒轻量级密钥管理协议
Pub Date : 2018-10-01 DOI: 10.4018/IJSSSP.2018100101
Muhammad Rana, Q. Mamun
To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication with a robust pervasive communication mechanism. However, due to the resource constraints and heterogeneous characteristics of the sensor devices, traditional authentication and key management schemes are not effective for such applications. Here, we propose a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications in which the sensor nodes can establish secure links with peer sensor nodes and end-users. The established authentication scheme is based on implicit certificates, and it provides application-level end-to-end security. A comprehensive description of the scenario based behaviour of the protocol is presented. With the performance evaluation and the security analysis, it is justified that the proposed scheme is viable to deploy in the resource constrained WSNs.
为了保持分布式物联网的可靠连接和可访问性,通过强大的普适通信机制建立端到端通信的安全链接至关重要。然而,由于传感器设备的资源限制和异构特性,传统的认证和密钥管理方案在此类应用中并不有效。本文为分布式物联网应用中的wsn提出了一种普遍的轻量级认证和密钥机制,其中传感器节点可以与对等传感器节点和最终用户建立安全链接。建立的身份验证方案基于隐式证书,提供应用层的端到端安全性。对基于场景的协议行为进行了全面的描述。通过性能评估和安全性分析,证明了该方案在资源受限的无线传感器网络中是可行的。
{"title":"A Robust and Lightweight Key Management Protocol for WSNs in Distributed IoT Applications","authors":"Muhammad Rana, Q. Mamun","doi":"10.4018/IJSSSP.2018100101","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018100101","url":null,"abstract":"To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication with a robust pervasive communication mechanism. However, due to the resource constraints and heterogeneous characteristics of the sensor devices, traditional authentication and key management schemes are not effective for such applications. Here, we propose a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications in which the sensor nodes can establish secure links with peer sensor nodes and end-users. The established authentication scheme is based on implicit certificates, and it provides application-level end-to-end security. A comprehensive description of the scenario based behaviour of the protocol is presented. With the performance evaluation and the security analysis, it is justified that the proposed scheme is viable to deploy in the resource constrained WSNs.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"38 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131500788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Theory Driven Modeling as the Core of Software Development 理论驱动建模是软件开发的核心
Pub Date : 2018-07-01 DOI: 10.4018/IJSSSP.2018070103
J. Osis, Erika Nazaruka
Some experts opine that software is built in a primitive way. The role of modeling as a treatment for the weakness of software engineering became more important when the principles of Model Driven Architecture (MDA) appeared. Its main advantage is architectural separation of concerns. It showed the necessity of modeling and opened the way for software development to become an engineering discipline. However, this principle does not demonstrate its whole potential power in practice because of lack of mathematical accuracy in the very initial steps of software development. The sufficiency of modeling in software development is still disputable. The authors believe that software development in general (and modeling in particular) based on mathematical formalism in all of its stages and together with the implemented principle of architectural separation of concerns can become an important part of software engineering in its real sense. They propose the formalism by topological modeling of system functioning as the first step towards engineering.
一些专家认为软件是以一种原始的方式构建的。当模型驱动体系结构(MDA)的原则出现时,建模作为软件工程弱点处理的角色变得更加重要。它的主要优点是架构上的关注点分离。它显示了建模的必要性,并为软件开发成为一门工程学科开辟了道路。然而,由于在软件开发的最初步骤中缺乏数学上的准确性,这一原则并没有在实践中展示出它的全部潜力。建模在软件开发中的充分性仍然是有争议的。作者认为,一般的软件开发(特别是建模)在其所有阶段都基于数学形式化,并与实现的架构分离原则一起,可以成为真正意义上的软件工程的重要组成部分。他们提出通过系统功能的拓扑建模作为走向工程的第一步的形式主义。
{"title":"Theory Driven Modeling as the Core of Software Development","authors":"J. Osis, Erika Nazaruka","doi":"10.4018/IJSSSP.2018070103","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018070103","url":null,"abstract":"Some experts opine that software is built in a primitive way. The role of modeling as a treatment for the weakness of software engineering became more important when the principles of Model Driven Architecture (MDA) appeared. Its main advantage is architectural separation of concerns. It showed the necessity of modeling and opened the way for software development to become an engineering discipline. However, this principle does not demonstrate its whole potential power in practice because of lack of mathematical accuracy in the very initial steps of software development. The sufficiency of modeling in software development is still disputable. The authors believe that software development in general (and modeling in particular) based on mathematical formalism in all of its stages and together with the implemented principle of architectural separation of concerns can become an important part of software engineering in its real sense. They propose the formalism by topological modeling of system functioning as the first step towards engineering.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"165 S348","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120851023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Dynamic Analysis Tools for Software Security 软件安全动态分析工具的评价
Pub Date : 2018-07-01 DOI: 10.4018/IJSSSP.2018070102
Michael Lescisin, Q. Mahmoud
This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern problems of unauthorized memory access such as buffer overflows, stack overflows, use-after-free, double-free, memory leaks, etc. Although not strictly a memory safety issue, concurrency issues, such as data races, will be considered as memory safety issues in this article. Input validation issues concern problems where untrusted input is directly passed to handlers which are designed to handle both data and commands. Examples of this include path traversal, SQL injection, command injection, JavaScript/HTML injection, etc. As a result of this significant difference between these two types of security vulnerabilities, two sets of tools are evaluated with one set focusing on memory safety issues and the other on input validation issues. This article explores the benefits and limitations of current software dynamic analysis tools by evaluating them against both the authors test cases as well as the OWASP Benchmark for Security Automation and proposes solutions for implementing secure software applications.
本文讨论了利用动态分析工具开发安全软件。一个安全的基于软件的系统应该在其整个开发生命周期(包括部署阶段)中集成安全检查和平衡。因此,本文既介绍了在开发中使用软件安全工具测试代码,也介绍了在部署中监视代码以确保其安全运行。本文中讨论的安全问题将分为两类——内存安全问题和输入验证问题。内存安全问题涉及未经授权的内存访问问题,如缓冲区溢出、堆栈溢出、free后使用、double-free、内存泄漏等。尽管严格来说不是内存安全问题,但本文将把并发性问题(如数据竞争)视为内存安全问题。输入验证问题涉及将不可信的输入直接传递给处理程序的问题,这些处理程序设计用于处理数据和命令。这方面的例子包括路径遍历、SQL注入、命令注入、JavaScript/HTML注入等。由于这两种类型的安全漏洞之间存在这种显著差异,因此需要评估两组工具,其中一组侧重于内存安全问题,另一组侧重于输入验证问题。本文通过对作者的测试用例和OWASP安全自动化基准进行评估,探讨了当前软件动态分析工具的优点和局限性,并提出了实现安全软件应用程序的解决方案。
{"title":"Evaluation of Dynamic Analysis Tools for Software Security","authors":"Michael Lescisin, Q. Mahmoud","doi":"10.4018/IJSSSP.2018070102","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018070102","url":null,"abstract":"This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern problems of unauthorized memory access such as buffer overflows, stack overflows, use-after-free, double-free, memory leaks, etc. Although not strictly a memory safety issue, concurrency issues, such as data races, will be considered as memory safety issues in this article. Input validation issues concern problems where untrusted input is directly passed to handlers which are designed to handle both data and commands. Examples of this include path traversal, SQL injection, command injection, JavaScript/HTML injection, etc. As a result of this significant difference between these two types of security vulnerabilities, two sets of tools are evaluated with one set focusing on memory safety issues and the other on input validation issues. This article explores the benefits and limitations of current software dynamic analysis tools by evaluating them against both the authors test cases as well as the OWASP Benchmark for Security Automation and proposes solutions for implementing secure software applications.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123509045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Need for Higher Education in Cyber Supply Chain Security and Hardware Assurance 网络供应链安全与硬件保障对高等教育的需求
Pub Date : 2018-04-01 DOI: 10.4018/IJSSSP.2018040102
B. Cohen, M. Albert, E. McDaniel
Higher education curricula, specialized degrees, and certificate programs related to cybersecurity are proliferating in response to student demand; faculty interest and expertise; employer demand; government and industry standards and funding; and the expectations of specialized, state, or regional accrediting agencies. These expanding academic programs, however, do not adequately address supply chain threats that affect national security. The authors assert that cyber supply chain risk management (C-SCRM), with a focus on hardware assurance, should be considered a critical aspect of cybersecurity and be included in higher education curricula to prepare the future cyber workforce to face challenges related to supply chain security and hardware assurance.
与网络安全相关的高等教育课程、专业学位和证书课程正在因应学生的需求激增;教员的兴趣和专长;雇主需求;政府和行业标准和资金;以及专业、州或地区认证机构的期望。然而,这些不断扩大的学术项目并没有充分解决影响国家安全的供应链威胁。作者断言,以硬件保障为重点的网络供应链风险管理(C-SCRM)应被视为网络安全的一个关键方面,并应纳入高等教育课程,以使未来的网络劳动力为应对与供应链安全和硬件保障相关的挑战做好准备。
{"title":"The Need for Higher Education in Cyber Supply Chain Security and Hardware Assurance","authors":"B. Cohen, M. Albert, E. McDaniel","doi":"10.4018/IJSSSP.2018040102","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018040102","url":null,"abstract":"Higher education curricula, specialized degrees, and certificate programs related to cybersecurity are proliferating in response to student demand; faculty interest and expertise; employer demand; government and industry standards and funding; and the expectations of specialized, state, or regional accrediting agencies. These expanding academic programs, however, do not adequately address supply chain threats that affect national security. The authors assert that cyber supply chain risk management (C-SCRM), with a focus on hardware assurance, should be considered a critical aspect of cybersecurity and be included in higher education curricula to prepare the future cyber workforce to face challenges related to supply chain security and hardware assurance.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122110947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. J. Syst. Softw. Secur. Prot.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1