Affiliation:
1. Centre for Research and Technology Hellas, 57001 Thessaloniki, Greece
2. Onelity Hellas MEPE, 57001 Thessaloniki, Greece
Abstract
The devastating consequences of successful security breaches that have been observed recently have forced more and more software development enterprises to shift their focus towards building software products that are highly secure (i.e., vulnerability-free) from the ground up. In order to produce secure software applications, appropriate mechanisms are required for enabling project managers and developers to monitor the security level of their products during their development and identify and eliminate vulnerabilities prior to their release. A large number of such mechanisms have been proposed in the literature over the years, but limited attempts with respect to their industrial applicability, relevance, and practicality can be found. To this end, in the present paper, we demonstrate an integrated security platform, the VM4SEC platform, which exhibits cutting-edge solutions for software security monitoring and optimization, based on static and textual source code analysis. The platform was built in a way to satisfy the actual security needs of a real software development company. For this purpose, an industrial case study was conducted in order to identify the current security state of the company and its security needs in order for the employed security mechanisms to be adapted to the specific needs of the company. Based on this analysis, the overall architecture of the platform and the parameters of the selected models and mechanisms were properly defined and demonstrated in the present paper. The purpose of this paper is to showcase how cutting-edge security monitoring and optimization mechanisms can be adapted to the needs of a dedicated company and to be used as a blueprint for constructing similar security monitoring platforms and pipelines.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference63 articles.
1. McGraw, G. (2006). Software Security: Building Security In, Addison-Wesley Professional.
2. Williams, L. (2021). Secure Software Lifecycle Knowledge Area Version 1.0.2. CyBok.
3. Apache Struts 2: How technical and development gaps caused the Equifax Breach;Luszcz;Netw. Secur.,2018
4. Heartbleed 101;Carvalho;IEEE Secur. Priv.,2014
5. Prevezianou, M.F. (2021). Understanding the Creeping Crisis, Palgrave Macmillan.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing the Supply Chain;Advances in Information Security, Privacy, and Ethics;2024-02-02