The Current Practices of Changing Secure Software: An Empirical Study
dc.contributor.author | Jamil, Ameerah Muhsina | |
dc.contributor.author | ben Othmane, Lotfi | |
dc.contributor.author | Ben Othmane, Lotfi | |
dc.contributor.author | Valani, Altaz | |
dc.contributor.author | Abdelkhalek, Moataz | |
dc.contributor.author | Tek, Ayhan | |
dc.contributor.department | Department of Electrical and Computer Engineering | |
dc.date | 2020-01-08T23:01:19.000 | |
dc.date.accessioned | 2020-06-30T02:01:56Z | |
dc.date.available | 2020-06-30T02:01:56Z | |
dc.date.copyright | Tue Jan 01 00:00:00 UTC 2019 | |
dc.date.embargo | 2019-01-01 | |
dc.date.issued | 2020-01-01 | |
dc.description.abstract | <p>Developers change the code of their software to add new features, fix bugs, or enhance its structure. Such frequent changes impact occasionally the security of the software. This paper reports a qualitative study of the practices of changing secure-software in the industry. The study involves interviews with eleven developers and security experts working on banking software, software for control systems, and software consultation companies. Through these interviews, we identified that the main security aspects are: dependency vulnerabilities, authentication and authorization, and OWASP 10 vulnerabilities. The common techniques used to assess software after code change are: code review, code analysis, testing, and keywords search. The main challenges that practitioners face are the diversity of the security issues and the lack of effectiveness of the security assurance tools in detecting vulnerabilities. The study suggests that developers of secure software need techniques that support effective security assurance of modified software.</p> | |
dc.description.comments | <p>This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Jamil, Ameerah Muhsinah, Lotfi ben Othmane, Altaz Valani, Moataz Abdelkhalek, and Ayhan Tek. “The Current Practices of Changing Secure Software.” The 35th ACM/SIGAPP Symposium On Applied Computing. Brno, Czech Republic, March 30-April 3, 2020. DOI: <a href="http://dx.doi.org/10.1145/3341105.3373922" target="_blank">10.1145/3341105.3373922</a>. Posted with permission.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/ece_conf/88/ | |
dc.identifier.articleid | 1091 | |
dc.identifier.contextkey | 16019010 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | ece_conf/88 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/20914 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/ece_conf/88/2020_BenOthameLotfi_CurrentPracticesChanging.pdf|||Sat Jan 15 02:17:20 UTC 2022 | |
dc.source.uri | 10.1145/3341105.3373922 | |
dc.subject.disciplines | Information Security | |
dc.subject.disciplines | Systems and Communications | |
dc.title | The Current Practices of Changing Secure Software: An Empirical Study | |
dc.type | article | |
dc.type.genre | conference | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 0e086bfc-15b0-453d-8ea4-6a78df07b01b | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 2020_BenOthameLotfi_CurrentPracticesChanging.pdf
- Size:
- 261.64 KB
- Format:
- Adobe Portable Document Format
- Description: