Software engineering for security
Top Cited Papers
- 1 May 2000
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 227-239
- https://doi.org/10.1145/336512.336559
Abstract
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every software- controlled system faces threats from potential adversaries, from Internet-aware client applications running on PCs, to complex telecommunications and power systems acces- sible over the Internet, to commodity software with copy protection mechanisms. Software engineers must be cog- nizant of these threats and engineer systems with credible defenses, while still delivering value to customers. In this paper, we present our perspectives on the research issues that arise in the interactions between software engineering and security.Keywords
This publication has 41 references indexed in Scilit:
- Cryptographic verification of test coverage claimsIEEE Transactions on Software Engineering, 2000
- Unlinkable serial transactionsACM Transactions on Information and System Security, 1999
- Cryptographic copyright protection for digital images based on watermarking techniquesTheoretical Computer Science, 1999
- Digital watermarkingCommunications of the ACM, 1998
- Certifying off-the-shelf software componentsComputer, 1998
- Extracting formal domain models from exsisting code for generative reuseACM SIGAPP Applied Computing Review, 1997
- Anonymous credit cards and their collusion analysisIEEE/ACM Transactions on Networking, 1996
- Checking the correctness of memoriesAlgorithmica, 1994
- Foundations for the study of software architectureACM SIGSOFT Software Engineering Notes, 1992
- Protection in operating systemsCommunications of the ACM, 1976