Proccedings of the 10th European Conference on Software Architecture Workshops 2016
DOI: 10.1145/2993412.3007552
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating security threats using tactics and patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…"The importance of identifying non-functional security requirements should be stressed more because it aids in the reduction or elimination of software vulnerabilities" [2,62,101]. "Misuse cases are similar to use cases in that they specify what a system should not do, and they are a great way to get security requirements" [98,[101][102][103].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…"The importance of identifying non-functional security requirements should be stressed more because it aids in the reduction or elimination of software vulnerabilities" [2,62,101]. "Misuse cases are similar to use cases in that they specify what a system should not do, and they are a great way to get security requirements" [98,[101][102][103].…”
Section: Discussionmentioning
confidence: 99%
“…In this stage, it is important to monitor responses to flaws and vulnerabilities of the system to check for newly evolved security threats. "After identifying new security risks, the same should be included in the requirement stage for further security improvements in subsequent releases" [67,103]. "Static analysis and peer review are two useful procedures for mitigating or minimizing newly discovered vulnerabilities" [14].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, some of the most common malware attacks include viruses, trojan virus, brute force attack, DNS hijacking, replay attacks [97], denial of service, flooding attacks, slicing attacks and cookie poisoning. These attacks negatively affect the processes of secure software development [11], [13], [98], [99]. In MITRE's Common Vulnerabilities Exposures database, the latest classification of common defects by type is provided.…”
Section: Causes Of Software Vulnerabilitiesmentioning
confidence: 99%