20,804 Hits in 3.8 sec

Evolution of Embedded Platform Security Technologies: Past, Present & Future Challenges

Fahad Siddiqui, Sakir Sezer
2020 2020 IEEE 33rd International System-on-Chip Conference (SOCC)  
It present the state-of-theart security frameworks and architectures, discuss architectural shortcomings and root-causes of leading security technologies rather than discussing vulnerabilities and attacks  ...  The paper concludes advocating secure-by-design platform approach and classifying platform security methods to realise robust embedded platform security architecture.  ...  CONCLUSION It has been evident that software security technologies are struggling to handle the explosion of security vulnerabilities and attacks.  ... 
doi:10.1109/socc49529.2020.9524778 fatcat:jplnmsi5tnepzhel7gdyffnfo4

Specialized System Development [chapter]

2005 Strategic Software Engineering  
Security-Driven Requirements Analysis Since a large portion of software engineering literature was developed prior to the web era, investigating vulnerabilities was rarely addressed adequately.  ...  This implies that software economics, system architecture and security are significant issues in pervasive software engineering.  ... 
doi:10.1201/9781420031119.ch13 fatcat:6r6yzwqxbnb4pn7t4hblptac54

Specialized system development

O. Eljabiri
2003 International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003.  
Security-Driven Requirements Analysis Since a large portion of software engineering literature was developed prior to the web era, investigating vulnerabilities was rarely addressed adequately.  ...  This implies that software economics, system architecture and security are significant issues in pervasive software engineering.  ... 
doi:10.1109/itre.2003.1270587 fatcat:puqck3rnbzef5bpwfiwvj3sbh4

Model driven security accreditation (MDSA)for agile, interconnected it landscapes

Ulrich Lang, Rudolf Schreiner
2009 Proceedings of the first ACM workshop on Information security governance - WISG '09  
Assurance accreditation of agile, interconnected IT landscapes is a great challenge, and is currently often cited as one of the showstoppers for the adoption of modern IT architectures (e.g. agile, model-driven  ...  This paper presents Model Driven Security Accreditation (MDSA), a novel approach for automating large parts of the compliance and assurance accreditation management processes (e.g.  ...  Model Driven Architecture (MDA), Model Driven Software Engineering (MDE), and executable Business Process Management (BPM)).  ... 
doi:10.1145/1655168.1655173 fatcat:fj53h4qjinhxrmcc5yjggqz4ya

Quantitative System-Level Security Verification of the IoV Infrastructure [article]

Jan Lauinger, Mudassar Aslam, Mohammad Hamad, Shahid Raza, Sebastian Steinhorst
2021 arXiv   pre-print
In detail, our methodology decomposes assets of the IoV infrastructure with the help of reference sub-architectures and the 4+1 view model analysis to map identified assets into data, software, networking  ...  However, the consolidation of complex computing domains of vehicles, the Internet, and the IoT limits the applicability of tailored security solutions.  ...  Our CVSS parameterization is driven by the IoV infrastructure analysis and indicates security critical parts of IoV architecture. A.  ... 
arXiv:2101.06137v1 fatcat:55qilbexpzh3lc6hppynnri35i

Artificial Intelligence and Machine Learning in 5G Network Security: Opportunities, advantages, and future research trends [article]

Noman Haider, Muhammad Zeeshan Baig, Muhammad Imran
2020 arXiv   pre-print
Also, an overview of key data collection points in 5G architecture for threat classification and anomaly detection are discussed.  ...  Therefore, AI and ML can play central role in protecting highly data-driven softwareized and virtualized network components.  ...  Distributed Denial of Service (DDoS) detection and prevention. Software-centric security for heavily software-driven network. Flexible algorithm modelling with evolving functionality.  ... 
arXiv:2007.04490v1 fatcat:wlpeaoyxbjc5pgfctx2eodwrpa

Enhancing Security and Privacy of Next-Generation Edge Computing Technologies

Matthew Hagan, Fahad Siddiqui, Sakir Sezer
2019 2019 17th International Conference on Privacy, Security and Trust (PST)  
software components, leading to the development of inconsistent and vulnerable solutions. • Complex hardware-software co-design, security modelling and integration practices, giving rise to vulnerabilities  ...  A vulnerability located within open source software may be of particular value as it may allow exploitation on multiple kinds of systems.  ... 
doi:10.1109/pst47121.2019.8949052 dblp:conf/pst/HaganSS19 fatcat:b2ibbz64gbgmbdmavzw2gedcaa

Architecture-Centric Testing for Security [chapter]

Sarah Al-Azzani, Ahmad Al-Natour, Rami Bahsoon
2014 Agile Software Architecture  
This thesis presents a novel architecture-centric approach, which uses Implied Scenarios (IS) to detect design-vulnerabilities in the software architecture.  ...  It proposes a three-phased method for security testing: (1) Detecting design-level vulnerabilities in the architecture in an incremental manner.  ...  Summary of Contribution This thesis presents a novel architecture-centric testing approach for security, which uses implied scenarios (ISs) [185] to detect design vulnerabilities in the software architecture  ... 
doi:10.1016/b978-0-12-407772-0.00009-5 fatcat:k764y7cq7bgavplxl2ovqbbdji

Modeling the linkage between systems interoperability and security engineering

Elena Irina Neaga, Michael J de C. Henshaw
2010 2010 5th International Conference on System of Systems Engineering  
in relation to software engineering [9] and Enterprise Security Architecture [11] .  ...  security vulnerabilities and minimize or contain risks associated with these vulnerabilities" [17] .  ... 
doi:10.1109/sysose.2010.5544056 dblp:conf/sysose/NeagaH10 fatcat:c6gfgus6urgcze7zff2sl5daie

A taxonomy and survey of self-protecting software systems

Eric Yuan, Sam Malek
2012 2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)  
Self-protecting software systems are a class of autonomic systems capable of detecting and mitigating security threats at runtime.  ...  They are growing in importance, as the stovepipe static methods of securing software systems have shown inadequate for the challenges posed by modern software systems.  ...  INTRODUCTION Security is the Achilles heel of most modern software systems.  ... 
doi:10.1109/seams.2012.6224397 dblp:conf/icse/YuanM12 fatcat:c6dk6qa2xbdericpuyhjpbkfhu

Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs

Fahad Siddiqui, Matthew Hagan, Sakir Sezer
2018 2018 31st IEEE International System-on-Chip Conference (SOCC)  
to vulnerabilities in hardware and software protocol stack boundaries, allowing to launch insider and outsider attacks. • Lack of availability of independent run-time security mechanisms that can detect  ...  Shortcomings of existing security approaches After reviewing different aspects of security vulnerabilities and state-of-art of secure architectures and their methodologies to protect system's critical  ... 
doi:10.1109/socc.2018.8618531 dblp:conf/socc/SiddiquiHS18 fatcat:4rxzt7pdwra6xgx7mrzytdpqou

Extracting and Analyzing the Implemented Security Architecture of Business Applications

B. J. Berger, K. Sohr, R. Koschke
2013 2013 17th European Conference on Software Maintenance and Reengineering  
The last years showed great progress in the area of static code analysis for the detection of common low-level security bugs, such as buffer overflows and cross-site scripting vulnerabilities.  ...  In addition, we carry out threat modeling on this extracted architecture to detect security flaws.  ...  of the extracted security architecture with respect to architectural vulnerabilities using threat modeling, 3) consideration of architectural security weaknesses as, for example, listed in the Common  ... 
doi:10.1109/csmr.2013.37 dblp:conf/csmr/BergerSK13 fatcat:2pqazywmovcslitv7wy7lahzz4

Security architecture metamodel for Model Driven security

Makhlouf Derdour, Adel Alti, Mohamed Gasmi, Philippe Roose
2015 Journal of Innovation in Digital Ecosystems  
SMSA Security connector UML profile ADL OCL Vulnerability point's detection architectures A B S T R A C T A key aspect of the design of any software system is its architecture.  ...  The design of an architecture meta-model that considers security connectors is required in order to ensure a realistic secure assembly and to address the problems of vulnerability of exchanging data flow  ...  for the long run to integrate software architecture in the framework MDA (Model Driven Architecture), which unifies all modeling approaches.  ... 
doi:10.1016/j.jides.2015.12.001 fatcat:rfpxpyppovgkxdaraow6jdw2gm

Detection of Firewall Fingerprinting and Vulnerability Prevention by Denial of Attacks on Web Application

Dilli Babu M, Balamani M, Mukesh G
2019 IJARCCE  
Firewalls are most important and critical devices which provides securities against all vulnerabilities. Firewall handles all the traffic in and out of the network.  ...  This security on application is achieved to prevent the above attacks. Thus, our proposed system of firewall fingerprinting methods can achieve quite high accuracy against all web vulnerability.  ...  the database contents to the attacker).SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal  ... 
doi:10.17148/ijarcce.2019.8254 fatcat:azz4f3wjizf4jlspbrh4lmnmfu

Evolution of Security Engineering Artifacts

Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe (+4 others)
2014 International Journal of Secure Software Engineering  
The article covers the state of the art on evolution of security requirements, security architectures, secure code, security tests, security models, and security risks as well as security monitoring.  ...  Security is an important quality aspect of modern open software systems. However, it is challenging to keep such systems secure because of evolution.  ...  FP7-256980) and SecureChange (FP7-231101), the FFG project "QE LaB Living Models for Open Systems" (FFG 822740), the FWF project MOBSTECO (FWF P 26194-N15), the DFG project "SecVolution" which is part of  ... 
doi:10.4018/ijsse.2014100103 fatcat:o6aq54ak5zbydk42w4psuaabxq
« Previous Showing results 1 — 15 out of 20,804 results