Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1370905.1370909acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

SAVE: static analysis on versioning entities

Published: 17 May 2008 Publication History

Abstract

Insufficiently tested software releases provoque a competition between 'exploiters' versus 'patchers'. Developing secure software from scratch greatly reduces maintenance effort. The integration of regular security checks combined with patch proposals at development time enhances the system's usability and software quality. This paper presents a software development system including version control, security analysis and patching support. As a practical aspect, avoiding flaws becomes easier even for non security experts.

References

[1]
B. W. Boehm. A spiral model of software development and enhancement. Computer, 21(5):61--72, May 1988.
[2]
J. Merrill. Proceedings of the gcc developers summit. May 2003.
[3]
S. Neuhaus, T. Zimmermann, C. Holler, and A. Zeller.
[4]
Predicting vulnerable software components. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 529--540, New York, NY, USA, 2007. ACM.
[5]
W. Royce. Managing the development of large software systems. In Proc. IEEE Wescon, pages 1--9, August 1970.
[6]
B. G. Ryder. Incremental data flow analysis. In POPL '83: Proceedings of the 10th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, pages 167--176, New York, NY, USA, 1983. ACM.
[7]
D. Schreckling and M. Johns. Automatisierter code-audit. Datenschutz und Datensicherheit - DuD, 31:888--893, December 2007.
[8]
M. Weiser. Program slicing. In Proceedings of the 5th International Conference on Software Engineering, pages 439--449. IEEE Computer Society Press, 1981.
[9]
J. Wilander. Modeling and visualizing security properties of code. In Proceedings of the 5th Conference on Software Engineering Research and Practice in Sweden (SERPS'05), pages 65--74, Vasteras, Sweden, October 2005.
[10]
J. Wilander and M. Kamkar. A comparison of publicly available tools for static intrusion prevention. In Proceedings of the 7th Nordic Workshop on Secure IT Systems, pages 68--84, Karlstad, Sweden, November 2002.
[11]
W. Yang, S. Horwitz, and T. Reps. Detecting program components with equivalent behaviors. Technical Report CS-TR-1989-840, University of Wisconsin - Madison, 1989.
[12]
J.-S. Yur, B. G. Ryder, and W. Landi. An incremental flow- and context-sensitive pointer aliasing analysis. In International Conference on Software Engineering, pages 442--451, 1999.
[13]
J.-S. Yur, B. G. Ryder, W. Landi, and P. Stocks. Incremental analysis of side effects for c software system. In International Conference on Software Engineering, pages 422--432, 1997.

Cited By

View all
  • (2008)The fourth international workshop on software engineering for secure systemsCompanion of the 30th international conference on Software engineering10.1145/1370175.1370251(1069-1070)Online publication date: 10-May-2008

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SESS '08: Proceedings of the fourth international workshop on Software engineering for secure systems
May 2008
72 pages
ISBN:9781605580425
DOI:10.1145/1370905
  • Program Chairs:
  • Bart De Win,
  • Seok-Won Lee,
  • Mattia Monga
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 May 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. incremental analysis
  2. secure software development
  3. static analysis
  4. version control system

Qualifiers

  • Research-article

Conference

ICSE '08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 8 of 11 submissions, 73%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 29 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2008)The fourth international workshop on software engineering for secure systemsCompanion of the 30th international conference on Software engineering10.1145/1370175.1370251(1069-1070)Online publication date: 10-May-2008

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media