Idea-caution before exploitation: the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities

Tayyaba Nafees, Natalie Coull, Robert Ian Ferguson, Adam Sampson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
210 Downloads (Pure)

Abstract

The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined. Software engineering methodologies do not make use of security domain knowledge in its form of vulnerability databases (e.g. CWE, CVE, Exploit DB), which are therefore not appropriate for this purpose. An approach based upon the improved use of pattern languages that encompasses security domain knowledge is proposed.
Original languageEnglish
Title of host publicationEngineering secure software and systems
Subtitle of host publication9th Internatinal symposium, ESSoS 2017 Bonn, Germany, July 3-5, 2017: proceedings
EditorsEric Bodden, Mathias Paye, Elias Athanasopoulos
Place of PublicationChambray
PublisherSpringer
Pages133-142
Number of pages10
Edition1
ISBN (Electronic)9783319621050
ISBN (Print)9783319621043
DOIs
Publication statusPublished - 5 Jul 2017
Event9th International Symposium on Engineering Secure Software and Systems - University of Bonn, Bonn, Germany
Duration: 3 Jul 20175 Jul 2017

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume10379
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Symposium on Engineering Secure Software and Systems
Abbreviated titleESSoS 2017
Country/TerritoryGermany
CityBonn
Period3/07/175/07/17

Keywords

  • Software development lifecycle (SDLC)
  • Security pattern (SP)
  • Software fault pattern (SFP)
  • Attack pattern (AP)
  • Vulnerability database (VDB)

Fingerprint

Dive into the research topics of 'Idea-caution before exploitation: the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities'. Together they form a unique fingerprint.

Cite this