The Second International Conference on Availability, Reliability and Security (ARES'07) 2007
DOI: 10.1109/ares.2007.96
|View full text |Cite
|
Sign up to set email alerts
|

How can the developer benefit from security modeling?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
14
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 11 publications
1
14
0
Order By: Relevance
“…More practical experience is needed in order to confirm whether this is achieved with our suggested approach, though we believe the practical recommendations will improve security testing in most projects and enable teams and organisations as a whole to learn from past mistakes. To be able to utilise the full potential of the vulnerability repository it is however necessary to integrate the use of the repository into working routines, and even better, to integrate the repository with development tools so that relevant information is available when needed [27].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…More practical experience is needed in order to confirm whether this is achieved with our suggested approach, though we believe the practical recommendations will improve security testing in most projects and enable teams and organisations as a whole to learn from past mistakes. To be able to utilise the full potential of the vulnerability repository it is however necessary to integrate the use of the repository into working routines, and even better, to integrate the repository with development tools so that relevant information is available when needed [27].…”
Section: Discussionmentioning
confidence: 99%
“…For describing risk it is possible to utilise the Common Vulnerability Scoring System [32]. By representing the vulnerabilities in a standard way it will be easier to share vulnerability information in an anonymised and generalised form, so that they can be integrated in a public or federated repository, as suggested by Ardi et al [27].…”
Section: What To Recordmentioning
confidence: 99%
See 1 more Smart Citation
“…Information on known vulnerabilities is available in several online repositories, but in general they are more directed towards system administrators than developers [5].…”
Section: Introductionmentioning
confidence: 99%
“…To develop secure software that are robust to defend exploits and attacks, security needs to be built into the Software Development Life Cycle (SDLC) [1]- [3]. Software engineers need to have the mindset of attackers, and understand threats that might affect the product [4], [5]. One of the software security best practices that can help software developers to think like an attacker is to create abuse cases.…”
Section: Introductionmentioning
confidence: 99%