Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the systematic analysis and detection of security problems, especially during early development phases. Based on well-known and established inspection techniques, we investigated traditional reading support, which did not fit exactly what we needed to ensure security goals. Therefore, we developed a new kind of checklist which we call guided checklist. This kind of checklist focuses the inspector much more on how to check security goals and provides the inspector with more fine-grained support than traditional reading support. To derive such checklists, we developed a model...
This paper addresses the influence the Checklist Based Reading inspection technique has on a develop...
Software is devilishly hard to inspect. Serious errors can escape attention for years. Consequently,...
Defects in requirements specifications can have severe consequences during the software development ...
Security is a crucial issue in many modern software systems and can lead to immense costs if require...
The quality assurance technique software inspection is often not sufficiently appreciated, especiall...
Security inspections are increasingly important for bringing security-relevant aspects into software...
Security inspections are increasingly important for bringing security-relevant aspects into software...
Although security inspections have proven to be a very efficient means for assuring software securit...
Security inspections, especially in the early development stage, are becoming increasingly important...
Inspections are an established quality assurance technique. In order to optimize the inspection appr...
Viewing security vulnerabilities as a specific type of software defect allows proven software engine...
Recent trends in the software development practices (Agile, De-vOps, CI) have shortened the developm...
Today's software is often subject to attacks that exploit vulnerabilities. Since in the area of secu...
Defects in requirement specifications can have severe consequences during the software development l...
Context: Security is a growing concern in many organizations. Industries developing software systems...
This paper addresses the influence the Checklist Based Reading inspection technique has on a develop...
Software is devilishly hard to inspect. Serious errors can escape attention for years. Consequently,...
Defects in requirements specifications can have severe consequences during the software development ...
Security is a crucial issue in many modern software systems and can lead to immense costs if require...
The quality assurance technique software inspection is often not sufficiently appreciated, especiall...
Security inspections are increasingly important for bringing security-relevant aspects into software...
Security inspections are increasingly important for bringing security-relevant aspects into software...
Although security inspections have proven to be a very efficient means for assuring software securit...
Security inspections, especially in the early development stage, are becoming increasingly important...
Inspections are an established quality assurance technique. In order to optimize the inspection appr...
Viewing security vulnerabilities as a specific type of software defect allows proven software engine...
Recent trends in the software development practices (Agile, De-vOps, CI) have shortened the developm...
Today's software is often subject to attacks that exploit vulnerabilities. Since in the area of secu...
Defects in requirement specifications can have severe consequences during the software development l...
Context: Security is a growing concern in many organizations. Industries developing software systems...
This paper addresses the influence the Checklist Based Reading inspection technique has on a develop...
Software is devilishly hard to inspect. Serious errors can escape attention for years. Consequently,...
Defects in requirements specifications can have severe consequences during the software development ...