2012
DOI: 10.1002/spe.2109
|View full text |Cite
|
Sign up to set email alerts
|

Improving software security with static automated code analysis in an industry setting

Abstract: SUMMARY Software security can be improved by identifying and correcting vulnerabilities. In order to reduce the cost of rework, vulnerabilities should be detected as early and efficiently as possible. Static automated code analysis is an approach for early detection. So far, only few empirical studies have been conducted in an industrial context to evaluate static automated code analysis. A case study was conducted to evaluate static code analysis in industry focusing on defect detection capability, deployment… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(27 citation statements)
references
References 25 publications
0
27
0
Order By: Relevance
“…Several studies evaluated static code analysis tools using other test suites or case studies [19][20][21][22]. University of Hamburg in collaboration with the Siemens CERT [19] created a test suite consisting of injected vulnerabilities in otherwise clean code.…”
Section: Related Workmentioning
confidence: 99%
“…Several studies evaluated static code analysis tools using other test suites or case studies [19][20][21][22]. University of Hamburg in collaboration with the Siemens CERT [19] created a test suite consisting of injected vulnerabilities in otherwise clean code.…”
Section: Related Workmentioning
confidence: 99%
“…Earlier, the authors have already been involved in conducting security research with the company (cf. [1]). During Cycles 1 to 4 the first researcher's responsibility was to facilitate the risk analysis, while in Cycles 5 and 6 this responsibility was with practitioners, and the researcher acted as an active participant in the risk analysis.…”
Section: Case 1: Development Of Countermeasure Graphsmentioning
confidence: 99%
“…Additionally, there is no specific security role inside FDD [66][67][68]. Of course there are many security methods that been applied in the real world [69][70][71][72][73][74][75][76][77][78][79][80], especially in Malaysia [80] and India [81].There is also discussion and much awareness among IT organizations regarding software security practices [82] and the human factors that could attribute to software security [83].However, there is no specific research regarding the integration of security and FDD.…”
Section: Q3: How Is the Integration Between Security And Fddmentioning
confidence: 99%