The Current Practices of Changing Secure Software: An Empirical Study

dc.contributor.author Jamil, Ameerah Muhsina
dc.contributor.author ben Othmane, Lotfi
dc.contributor.author Ben Othmane, Lotfi
dc.contributor.author Valani, Altaz
dc.contributor.author Abdelkhalek, Moataz
dc.contributor.author Tek, Ayhan
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2020-01-08T23:01:19.000
dc.date.accessioned 2020-06-30T02:01:56Z
dc.date.available 2020-06-30T02:01:56Z
dc.date.copyright Tue Jan 01 00:00:00 UTC 2019
dc.date.embargo 2019-01-01
dc.date.issued 2020-01-01
dc.description.abstract <p>Developers change the code of their software to add new features, fix bugs, or enhance its structure. Such frequent changes impact occasionally the security of the software. This paper reports a qualitative study of the practices of changing secure-software in the industry. The study involves interviews with eleven developers and security experts working on banking software, software for control systems, and software consultation companies. Through these interviews, we identified that the main security aspects are: dependency vulnerabilities, authentication and authorization, and OWASP 10 vulnerabilities. The common techniques used to assess software after code change are: code review, code analysis, testing, and keywords search. The main challenges that practitioners face are the diversity of the security issues and the lack of effectiveness of the security assurance tools in detecting vulnerabilities. The study suggests that developers of secure software need techniques that support effective security assurance of modified software.</p>
dc.description.comments <p>This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Jamil, Ameerah Muhsinah, Lotfi ben Othmane, Altaz Valani, Moataz Abdelkhalek, and Ayhan Tek. “The Current Practices of Changing Secure Software.” The 35th ACM/SIGAPP Symposium On Applied Computing. Brno, Czech Republic, March 30-April 3, 2020. DOI: <a href="http://dx.doi.org/10.1145/3341105.3373922" target="_blank">10.1145/3341105.3373922</a>. Posted with permission.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/ece_conf/88/
dc.identifier.articleid 1091
dc.identifier.contextkey 16019010
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath ece_conf/88
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/20914
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/ece_conf/88/2020_BenOthameLotfi_CurrentPracticesChanging.pdf|||Sat Jan 15 02:17:20 UTC 2022
dc.source.uri 10.1145/3341105.3373922
dc.subject.disciplines Information Security
dc.subject.disciplines Systems and Communications
dc.title The Current Practices of Changing Secure Software: An Empirical Study
dc.type article
dc.type.genre conference
dspace.entity.type Publication
relation.isAuthorOfPublication 0e086bfc-15b0-453d-8ea4-6a78df07b01b
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
2020_BenOthameLotfi_CurrentPracticesChanging.pdf
Size:
261.64 KB
Format:
Adobe Portable Document Format
Description: