Results 261 to 270 of about 5,764,266 (332)
Some of the next articles are maybe not open access.
When Software Security Meets Large Language Models: A Survey
IEEE/CAA Journal of Automatica SinicaSoftware security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two
Xiaogang Zhu +5 more
semanticscholar +1 more source
First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering (TASE '07), 2007
Security vulnerabilities are increasingly due to software. While we focus much of our attention today on code-level vulnerabilities, such as buffer overflows, we should be paying more attention to design-level vulnerabilities. Independently designed and implemented components may individually behave properly, but when put together, unanticipated ...
openaire +1 more source
Security vulnerabilities are increasingly due to software. While we focus much of our attention today on code-level vulnerabilities, such as buffer overflows, we should be paying more attention to design-level vulnerabilities. Independently designed and implemented components may individually behave properly, but when put together, unanticipated ...
openaire +1 more source
A Case Study of Software Security Red Teams at Microsoft
IEEE Symposium on Visual Languages / Human-Centric Computing Languages and Environments, 2020The modern software security adversary employs persistent and evasive attack techniques, for example—using zero-day exploits that have not been disclosed publicly—to target high-profile companies for political and economic espionage or to exfiltrate ...
Justin Smith +2 more
semanticscholar +1 more source
IEEE Security & Privacy Magazine, 2004
Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking's importance, but they need some help in understanding how to tackle it. The article aims to provide that help by exploring software security best practices.
openaire +1 more source
Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking's importance, but they need some help in understanding how to tackle it. The article aims to provide that help by exploring software security best practices.
openaire +1 more source
Improving software security awareness using a serious game
IET Software, 2019Protecting people from cyber threats imposes great challenges, not only technically, but also socially. To achieve the intended level of awareness, software security principles need to be shown with concrete examples during security education. This study
Affan Yasin +4 more
semanticscholar +1 more source
2013 20th IEEE International Conference and Workshops on Engineering of Computer Based Systems (ECBS), 2013
The importance of IT security is out of doubt. Data, computer and network security are essential for any business or organization. Software security often remains out of focus, from an organization's, a developer's and from an end-user's point of view. We will consider security terminology, security bugs, security flaws, and mitigation issues.
openaire +1 more source
The importance of IT security is out of doubt. Data, computer and network security are essential for any business or organization. Software security often remains out of focus, from an organization's, a developer's and from an end-user's point of view. We will consider security terminology, security bugs, security flaws, and mitigation issues.
openaire +1 more source
Research Directions in Software Supply Chain Security
ACM Transactions on Software Engineering and MethodologyReusable software libraries, frameworks, and components, such as those provided by open source ecosystems and third-party suppliers, accelerate digital innovation.
Laurie Williams +14 more
semanticscholar +1 more source
Proceedings of the first ACM conference on Data and application security and privacy, 2011
Widely publicized breaches regularly occur involving insecure software. This is due to the fact that the vast majority of software in use today was not designed to withstand attacks encountered when deployed on hostile networks such as the Internet. What limited vulnerability statistics that exist confirm that most modern software includes coding flaws
openaire +1 more source
Widely publicized breaches regularly occur involving insecure software. This is due to the fact that the vast majority of software in use today was not designed to withstand attacks encountered when deployed on hostile networks such as the Internet. What limited vulnerability statistics that exist confirm that most modern software includes coding flaws
openaire +1 more source
The Impact of Software Security Practices on Development Effort: An Initial Survey
International Symposium on Empirical Software Engineering and Measurement, 2019Background: Software projects are facing the need to adopt security practices during the software development life cycle (SDLC). Nevertheless, the amount of effort to be invested in order to achieve a certain level of software security is not clear yet ...
Elaine Venson +4 more
semanticscholar +1 more source
Market Segmentation and Software Security: Pricing Patching Rights
Management Sciences, 2019The patching approach to security in the software industry has been less effective than desired. One critical issue with the status quo is that the endowment of “patching rights” (the ability for a user to choose whether security updates are applied ...
T. August, D. Dao, Kihoon Kim
semanticscholar +1 more source

