Kama, Mohd. Nazri and Hedayatpour, Saman (2014) Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model. International Journal of Software Engineering and its Applications, 8 (8). pp. 171-180. ISSN 1738-9984
Full text not available from this repository.
Official URL: http://dx.doi.org/10.14257/ijseia.2014.8.8,16
Abstract
Regardless that the classic buffer overflow is a known and simple threat against software systems; security agencies still consider this threat as one of the most common software vulnerabilities. Aiming to increasing security resistance against this software threat, emphasize on software design phase is highly reasonable where cost and time required for fixing error in design level is several times lesser than coding or implementation levels. In this purpose, we use the Attack-based security analysis model for tracking and mitigating the classic buffer overflow during the software design phase. Through this model, we use known properties and behaviors of the buffer overflow to determine system vulnerabilities and address required security aspects. In this paper, we describe how to apply the Attack-based security analysis model for increasing security resistance against the classic buffer overflow. The main contribution of this work refers to showing capability of the Attack-based security analysis model in tracking and mitigating the classic buffer overflow into the software design phase in such a way that additional cost and time are not required for system analyzing and defining threat scenario.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | software design, software threats |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Advanced Informatics School |
ID Code: | 63110 |
Deposited By: | Siti Nor Hashidah Zakaria |
Deposited On: | 15 Jun 2017 01:36 |
Last Modified: | 15 Jun 2017 01:36 |
Repository Staff Only: item control page