Security requirements change, but the typical way of improving system security by patches is ad hoc and has not produced good results. Security improvements should be systematic, just as new features can be added to software systematically. It would be easier to improve the security of a system if we had a catalog of security-oriented program transformations that could be used to plan changes, to divide the work to make changes, and as a target of automation. This paper describes a catalog of security-oriented program transformations that were derived from security patterns. It describes several ways of categorizing these transformations, our first attempts at validating the catalog, and how the catalog can be used to improve the security o...
Abstract. Before starting the security analysis of an existing system, the most likely outcome is of...
This thesis contributes to three research areas in software security, namely security requirements a...
Due to the character of the original source materials and the nature of batch digitization, quality ...
Security requirements change, but the typical way of improving system security by patches is ad hoc ...
Abstract. Security requirements change, but the typical way of im-proving system security by patches...
Security experts generally believe that, "security cannot be added on, it must be designed from the ...
A security-oriented program transformation maps pro-grams to security-augmented programs, i.e. it in...
Before starting a rigorous security analysis of a given software system, the most likely outcome is ...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
Recurring solutions to software engineering problems are often captured in patterns, which describe,...
Modern software development depends on tools and techniques to represent implied information process...
With the increasing demand for developing high-quality and more reliable systems, the process of dev...
Security metrics have been proposed to assess the security of software applications based on the pri...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
Abstract. Before starting the security analysis of an existing system, the most likely outcome is of...
Abstract. Before starting the security analysis of an existing system, the most likely outcome is of...
This thesis contributes to three research areas in software security, namely security requirements a...
Due to the character of the original source materials and the nature of batch digitization, quality ...
Security requirements change, but the typical way of improving system security by patches is ad hoc ...
Abstract. Security requirements change, but the typical way of im-proving system security by patches...
Security experts generally believe that, "security cannot be added on, it must be designed from the ...
A security-oriented program transformation maps pro-grams to security-augmented programs, i.e. it in...
Before starting a rigorous security analysis of a given software system, the most likely outcome is ...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
Recurring solutions to software engineering problems are often captured in patterns, which describe,...
Modern software development depends on tools and techniques to represent implied information process...
With the increasing demand for developing high-quality and more reliable systems, the process of dev...
Security metrics have been proposed to assess the security of software applications based on the pri...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
Abstract. Before starting the security analysis of an existing system, the most likely outcome is of...
Abstract. Before starting the security analysis of an existing system, the most likely outcome is of...
This thesis contributes to three research areas in software security, namely security requirements a...
Due to the character of the original source materials and the nature of batch digitization, quality ...