EconPapers    
Economics at your fingertips  
 

Brief Review of Software Security History with an Emphasis on Efforts Focused at Early Stages of the Software Lifecycle

Spyros T. Halkidis, Alexander Chatzigeorgiou and George Stephanides

Journal of Information Privacy and Security, 2014, vol. 10, issue 1, 3-27

Abstract: The importance of software security has been profound recently. The main issue during the early efforts of the late 90s was how to counterattack the buffer overflows problem. However, emphasis has recently shifted on how to counterfeit software attacks at the design level starting with the introduction of security patterns. We have qualitatively analyzed the most important security patterns, and quantitatively evaluated software systems based on their design, using fuzzy risk analysis, based on the security patterns they contain and the STRIDE model of attacks. Additionally, we have analyzed the effectiveness of code obfuscation techniques, which we think is a starting point for future research.

Date: 2014
References: Add references at CitEc
Citations:

Downloads: (external link)
http://hdl.handle.net/10.1080/15536548.2014.912481 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:10:y:2014:i:1:p:3-27

Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20

DOI: 10.1080/15536548.2014.912481

Access Statistics for this article

Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit

More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

 
Page updated 2025-03-20
Handle: RePEc:taf:uipsxx:v:10:y:2014:i:1:p:3-27