Academic literature on the topic 'Software and application security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software and application security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software and application security"

1

Abozeid, Amr, AbdAllah Adel AlHabshy, and Kamal ElDahshan. "A Software Security Optimization Architecture (SoSOA) and its Adaptation for Mobile Applications." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 11 (June 4, 2021): 148. http://dx.doi.org/10.3991/ijim.v15i11.20133.

Full text
Abstract:
Security attacks become daily news due to an exposure of a security threat in a widely used software. Taking software security into consideration during the analysis, design, and implementation phases is a must. A software application should be protected against any security threat such as unauthorized distribution or code retrieval. Due to the lack of applying a software security standard architecture, developers may create software that may be vulnerable to many types of security threats. This paper begins by reviewing different types of known software security threats and their countermeasure mechanisms. Then, it proposes a new security optimization architecture for software applications. This architecture is a step towards establishing a standard to guarantee the software's security. Furthermore, it proposes an adapted software security optimization architecture for mobile applications. Besides, it presents an algorithmic implementation of the newly proposed architecture, then it proves its security. Moreover, it builds a secure mobile application based on the newly proposed architecture.
APA, Harvard, Vancouver, ISO, and other styles
2

Peng, Jianping, Meiwen Guo, and Jing Quan. "Software Vulnerability and Application Security Risk." Information Resources Management Journal 32, no. 1 (January 2019): 48–57. http://dx.doi.org/10.4018/irmj.2019010103.

Full text
Abstract:
This research investigates the software vendor-based relationships between software vulnerability and application security risk. The data is obtained from the China National Vulnerability Database of Information Security (CNNVD). At first, we use the latent class model to classify the software vendors into three categories, and then employ regression models to estimate relationships between software vulnerability and application security risk for each of the three categories of the software vendors. The results show the relationships vary across the software vendors. The findings suggest that an IT vendor should learn specific vulnerability features according to its type to effectively avoid vulnerability generation on their products.
APA, Harvard, Vancouver, ISO, and other styles
3

Payne, Jeffery. "Integrating Application Security into Software Development." IT Professional 12, no. 2 (March 2010): 6–9. http://dx.doi.org/10.1109/mitp.2010.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shin, Michael E., Hassan Gomaa, Don Pathirage, Chase Baker, and Bhavya Malhotra. "Design of Secure Software Architectures with Secure Connectors." International Journal of Software Engineering and Knowledge Engineering 26, no. 05 (June 2016): 769–805. http://dx.doi.org/10.1142/s021819401650025x.

Full text
Abstract:
This paper describes the design of secure connectors that are used in the design of secure software architectures for distributed business applications. Mixing security concerns with business concerns in software architectures makes applications more complex. With the goal of making secure software architectures more maintainable and evolvable, the secure connectors proposed in this paper are designed separately from business application components by considering different communication patterns between the components as well as security services required by application components. Each secure connector encapsulates security relevant objects to provide application components with security services. In this paper, secure connectors are applied to design the software architectures of electronic commerce and automated teller machine applications.
APA, Harvard, Vancouver, ISO, and other styles
5

Karakaneva, J. "Software applications security." Trakia Journal of Science 12, no. 4 (2014): 418–24. http://dx.doi.org/10.15547/tjs.2014.04.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hosniara Pervin. "Software as a service and security." World Journal of Advanced Research and Reviews 11, no. 3 (September 30, 2021): 327–31. http://dx.doi.org/10.30574/wjarr.2021.11.3.0459.

Full text
Abstract:
Nowadays, Cloud Computing is an important hi-tech research area in the most recent innovation. These advancements give clients a few benefits: cost-adequacy, effective asset usage, cooperation, catastrophe recuperation, and elite. Cloud offers administrations for processing on a solitary mouse click. The overview was completed in the type of an online survey. This examination paper exhibits that SaaS is safer than other web applications. SaaS is superior to different applications and SaaS is savvy. This Research paper investigates the significance of SaaS for productive distributed computing for associations and its suggestions. This examination paper additionally talks about the significance of SaaS application engineering, usefulness, proficiency, benefits, and weaknesses.
APA, Harvard, Vancouver, ISO, and other styles
7

Algarni, Sultan, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni, and Aiiad Albeshri. "BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking." Electronics 11, no. 7 (March 23, 2022): 996. http://dx.doi.org/10.3390/electronics11070996.

Full text
Abstract:
Software-defined networking (SDN) has emerged as a flexible and programmable network architecture that takes advantage of the benefits of global visibility and centralized control over a network. One of the main properties of the SDN architecture is the ability to offer a northbound interface (NBI), which enables network applications to access the SDN controller resources. However, the NBI can be compromised by a malicious application due to the lack of standardization and security aspects in the most current NBI designs. Therefore, in this paper, we propose a novel comprehensive security solution for securing the application–controller interface, named BCNBI. We propose a controller-independent lightweight blockchain architecture and exploit the security features of blockchain while limiting the blockchain’s computational overhead. BCNBI automatically verifies application and SDN controller credentials through token-based authentication. The proposed solution enforces fine-grained access control for each application’s API request and classifies the permission set into strict and normal policies, in order to add an extra level of security. In addition, the trustworthiness of applications is evaluated in order to prevent malicious activities. We implemented our blockchain-based solution to analyze its security, based on the confidentiality–integrity–availability model criteria, and evaluated the introduced overhead in terms of processing time and packet overhead. The experimental results demonstrate that the BCNBI can effectively secure the NBI, based on the fundamental security goals, while introducing insignificant overhead.
APA, Harvard, Vancouver, ISO, and other styles
8

Khan, Khaled M. "Software Security Engineering." International Journal of Secure Software Engineering 3, no. 1 (January 2012): 62–63. http://dx.doi.org/10.4018/jsse.2012010104.

Full text
Abstract:
Muthu Ramachandran from Leeds Metropolitan University, UK has recently published a book entitled, Software Security Engineering: Design and Applications. The author claims that the book provides systematic approaches to engineering, building and assuring software security throughout software lifecycle, software security based requirements engineering, design for software security, software security implementation, best practice guideline on developing software security, test for software security, and quality validation for software security.
APA, Harvard, Vancouver, ISO, and other styles
9

Rauf, Bilal, Haider Abbas, Muhammad Usman, Tanveer A. Zia, Waseem Iqbal, Yawar Abbas, and Hammad Afzal. "Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3453648.

Full text
Abstract:
Software Defined Networking (SDN) is an evolving technology that decouples the control functionality from the underlying hardware managed by the control plane. The application plane supports programmers to develop numerous applications (such as networking, management, security, etc.) that can even be executed from remote locations. Northbound interface (NBI) bridges the control and application planes to execute the third-party applications business logic. Due to the software bugs in applications and existing vulnerabilities such as illegal function calling, resource exhaustion, lack of trust, and so on, NBIs are susceptible to different attacks. Based on the extensive literature review, we have identified that the researchers and academia have mainly focused on the security of the control plane, data plane, and southbound interface (SBI). NBI, in comparison, has received far less attention. In this article, the security of the least explored, but a critical component of the SDN architecture, i.e., NBI, is analyzed. The article provides a brief overview of SDN, followed by a detailed discussion on the categories of NBI, vulnerabilities of NBI, and threats posed by malicious applications to NBI. Efforts of the researchers to counter malicious applications and NBI issues are then discussed in detail. The standardization efforts for the single acceptable NBI and security requirements of SDN by Open Networking Foundation (ONF) are also presented. The article concludes with the future research directions for the security of a single acceptable NBI.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhai, Hui, Hui Shi, and Rui Zhai. "The Application of Software Testing Technology on Security in Web Application System." Applied Mechanics and Materials 556-562 (May 2014): 6159–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6159.

Full text
Abstract:
Based on a hotel management information system developed by the ASP.NET technology and browser / server mode, for example, the security of the system was checked by software testing techniques, and the security flaws were found in the system, the improvements algorithm was given also.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Software and application security"

1

Söderquist, Mårten. "Tiny Security : Evaluating energy use for security in an IoT application." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36860.

Full text
Abstract:
IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. To keep data reliable, various   security aspects have to be considered. Constrained devices are limited by   memory size and battery life, a security solution has to be developed with   this in mind. In this study an IoT security solution was developed in collaboration   with a research group in environmental science at Umeå University. We   selected commonly used algorithms and compared them with the goal to provide   authentication and integrity for an IoT application, while minimizing energy   use running on an Atmega 1284P. The results showed that the encryption   algorithm AES-256-GCM is a good choice for a total security solution.   AES-256-GCM provides authenticated encryption with additional data while, in   relation to the other tested algorithms, using energy at a low level and   leaving a small program size footprint.
APA, Harvard, Vancouver, ISO, and other styles
2

Dell'Aguzzo, Paolo. "The secret life of software applications." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7405/.

Full text
Abstract:
One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechanisms for the management of security. The analysis is focused on how the architecture of the two systems protects users from threats and highlights the real presence of malware and spyware in their respective application stores. The work described in subsequent chapters explains the study of the behavior of 50 Android applications and 50 iOS applications performed using network analysis software. Furthermore, this thesis presents some statistics about malware and spyware present on the respective stores and the permissions they require. At the end the reader will be able to understand how to recognize malicious applications and which of the two systems is more suitable for him. This is how this thesis is structured. The first chapter introduces the security mechanisms of the Android and iOS platform architectures and the security mechanisms of their respective application stores. The Second chapter explains the work done, what, why and how we have chosen the tools needed to complete our analysis. The third chapter discusses about the execution of tests, the protocol followed and the approach to assess the “level of danger” of each application that has been checked. The fourth chapter explains the results of the tests and introduces some statistics on the presence of malicious applications on Play Store and App Store. The fifth chapter is devoted to the study of the users, what they think about and how they might avoid malicious applications. The sixth chapter seeks to establish, following our methodology, what application store is safer. In the end, the seventh chapter concludes the thesis.
APA, Harvard, Vancouver, ISO, and other styles
3

Wanderydz, Kristoffer. "WEB APPLICATION SECURITY IN THE JAVA ENVIRONMENT." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2370.

Full text
Abstract:
This project focuses on web security. Some of the most famous vulnerabilities, known troubling web applications. Has been collected and analyzed. Each vulnerability collected in this project, was exploited and secured. Demon- strations from a web application prototype, developed for this project. Brings real examples for each vulnerability, both secured, and insecured. The proto- type ran on a Tomcat web server, and was developed with frameworks such as Web, Spring and Hibernate. Connected to one PostgreSQL data source. All vulnerabilities was successfully implemented in Spring framework, and they were all exploited. Every vulnerability was also secured, with different tools and methods from earlier mentioned frameworks. As a result, real examples from the prototype is used for demonstration in the project, both in a secure and an insecure state. The result views Spring as a framework with good security potential. Most of the Spring specific vulnerabilities, are logical design flaws from developers that can be avoided. Vulnerabilities not related to Spring, such as the one collected for this project. Could be prevented by using methods from the Spring framework or intelligent programming. Which leads to conclusions. Web applications are always exposed to attacks, no matter the framework in use. Creative hackers search to discover new vul- nerabilities, and update old ones all the time. Developers has a responsibility, towards the web applications users. Web applications can not just developed for normal use, but also against possible misuse. Frameworks with good reputation and well processed models, is a good ground for developing a secure application.
APA, Harvard, Vancouver, ISO, and other styles
4

Foster, Nathalie Louise. "The application of software and safety engineering techniques to security protocol development." Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Srilatha, Rondla, and Gande Someshwar. "Security Testing for Web Applications in SDLC." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2903.

Full text
Abstract:
Context: In Web applications, the Software vulnerability can be reduced by applying security testing in all phases of the software development life cycle (SDLC). Lot of vulnerabilities might occur if the security testing is applied in the last phase of SDLC. In order to mitigate these vulnerabilities, a lot of rework is required that involves reverse engineering in the development and design phases. To overcome this situation, organizations are shifting from security testing (performed in last phase) towards security testing in the early phases of SDLC. Objectives: The main objectives of this thesis are to gather the benefits and challenges of security testing in the last phase versus security testing in every phase of the SDLC. After gathering, authors want to compare both implementations because these days most organizations are shifting from last phase to every phase of SDLC. Justification to the reason can be achieved by this comparison. Methods: In order to satisfy the objectives of this thesis, a literature review and interviews were conducted. The literature review was conducted by gathering benefits and challenges of last phase and every phase of SDLC. Authors have applied coding technique to the data gathered from literature review. By using the results from literature review, a set of questions were framed. Based on these questions, interviews in various organizations were performed. To analyze the practitioner’s data we used Sorting and Coding technique. Then, we conducted a comparative analysis to compare both results. Results: Application of security testing in the last phase of the SDLC results in a lot of rework which in turn leads to instability in managing the cost, time and resources in an organisation. In order to overcome this, more and more organisations are introducing security testing at each and every phase of SDLC. Conclusions: It can be concluded that every phase of security testing in SDLC has more benefits than applying in last phase of SDLC. To evaluate this process more research is needed to acquire more knowledge of security testing in all phases of SDLC. Through literature review and interviews conducted, it is evident that security testing at early phases causes a reduction in rework which in turn leads to more efficient management of cost, time and resources of a project.
+91 8977404640
APA, Harvard, Vancouver, ISO, and other styles
6

Mayo, Quentin R. "Detection of Generalizable Clone Security Coding Bugs Using Graphs and Learning Algorithms." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404548/.

Full text
Abstract:
This research methodology isolates coding properties and identifies the probability of security vulnerabilities using machine learning and historical data. Several approaches characterize the effectiveness of detecting security-related bugs that manifest as vulnerabilities, but none utilize vulnerability patch information. The main contribution of this research is a framework to analyze LLVM Intermediate Representation Code and merging core source code representations using source code properties. This research is beneficial because it allows source programs to be transformed into a graphical form and users can extract specific code properties related to vulnerable functions. The result is an improved approach to detect, identify, and track software system vulnerabilities based on a performance evaluation. The methodology uses historical function level vulnerability information, unique feature extraction techniques, a novel code property graph, and learning algorithms to minimize the amount of end user domain knowledge necessary to detect vulnerabilities in applications. The analysis shows approximately 99% precision and recall to detect known vulnerabilities in the National Institute of Standards and Technology (NIST) Software Assurance Metrics and Tool Evaluation (SAMATE) project. Furthermore, 72% percent of the historical vulnerabilities in the OpenSSL testing environment were detected using a linear support vector classifier (SVC) model.
APA, Harvard, Vancouver, ISO, and other styles
7

Backman, Lars. "Why is security still an issue? : A study comparing developers’ software security awareness to existing vulnerabilities in software applications." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-153438.

Full text
Abstract:
The need for secure web applications grows ever stronger the more sensitive, personal data makes its’ way onto the Internet. During the last decade, hackers have stolen enormous amounts of data from high profile companies and social institutions. In this paper, we answer the question of why security breaches still occur; Why do programmers write vulnerable code? To answer this question, we conducted a case study on a smaller software development company. By performing penetration tests, surveys and interviews we successfully identified several weaknesses in their product and their way of working, that could lead to security breaches in their application. We also conducted a security awareness assessment and found multiple contributing factors to why these weaknesses occur. Insufficient knowledge, misplaced trust, and inadequate testing policies are some of the reasons why these vulnerabilities appeared in the studied application.
APA, Harvard, Vancouver, ISO, and other styles
8

Ur-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.

Full text
Abstract:
Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications. Bugs and vulnerabilities are the result of weak software architecture and lack of standard software development practices. Despite the fact that software companies are investing millions of dollars in the research and development of software designs security risks are still at large. In some cases software applications are found to carry vulnerabilities for many years before being identified. A recent such example is the popular Heart Bleed Bug in the Open SSL/TSL. In today’s world, where new software application are continuously being developed for a varied community of users; it’s highly unlikely to have software applications running without flaws. Attackers on computer system securities exploit these vulnerabilities and bugs and cause threat to privacy without leaving any trace. The most critical vulnerabilities are those which are related to the integrity of the software applications. Because integrity is directly linked to the credibility of software application and data it contains. Here I am giving solution of maintaining web applications integrity running on RADIUM by using daikon. Daikon generates invariants, these invariants are used to maintain the integrity of the web application and also check the correct behavior of web application at run time on RADIUM architecture in case of any attack or malware. I used data invariants and program flow invariants in my solution to maintain the integrity of web-application against such attack or malware. I check the behavior of my proposed invariants at run-time using Lib-VMI/Volatility memory introspection tool. This is a novel approach and proof of concept toward maintaining web application integrity on RADIUM.
APA, Harvard, Vancouver, ISO, and other styles
9

Chan, Ping-fai, and 陳秉暉. "Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B50899569.

Full text
Abstract:
Static and dynamic program analysis techniques are important research areas in software security. Static analysis helps us locate vulnerabilities in a software by looking at the source code. Dynamic analysis helps us reason about the behavior of the software from information gathered at run-time. In this thesis, we are focusing on data flow analysis and heap analysis which are key static and dynamic program analysis techniques respectively. In the first part of this thesis, we aim at detecting vulnerabilities in Android applications which have capability leaks. The security of the Android platform relies mainly on sandboxing applications and restricting their capabilities such that no application, by default, can perform any operations that would adversely impact other applications, the operating system, or the user. However, a recent research reported that a genuine but vulnerable application may leak its capabilities. When being leveraged, other applications can gain extra capabilities which they are not granted originally. We present DroidChecker, an Android application analyzing tool which searches for the aforementioned vulnerability in Android applications. DroidChecker uses interprocedural control flow graph searching and static taint checking to detect exploitable data paths in an Android application. We analyzed more than 1100 Android applications using DroidChecker and found 6 previously unknown vulnerable applications including the renowned Adobe Photoshop Express application. We also developed a malicious application that exploits the previously unknown vulnerability found in the Adobe Photoshop Express application. We showed that the malicious application, which is not granted any permissions, can access contacts on the phone with just a few lines of code. In the second part of this thesis, we explore the use of heap analysis to extract software birthmarks. There are techniques like code obfuscation and watermarking which can make the source code of a program difficult to understand by humans and prove the ownership of the program. However, code obfuscation cannot avoid the source code being copied and a watermark can be defaced. A birthmark is a group of unique characteristics a program possesses that can be used to identify the program. We propose two novel dynamic birthmark systems based on the run-time heap. A dynamic birthmark is one that is extracted when the program is executing. Since it is based on the run-time behavior of the program, semantics-preserving transformations of the code like obfuscation cannot defeat dynamic birthmarks. In this regard, dynamic birthmarks are more robust compared with static birthmarks. To the best of our knowledge, these are the first birthmark systems using heap analysis as the underlying technique. The basic idea is to take snapshots of the heap while the program is running. From the snapshots, heap graphs are constructed to model the referencing structure between objects. After going through some filtering and referencing processes, they become the birthmarks. The two birthmark systems have been devised to extract birthmarks for Java programs and JavaScript programs respectively. While the underlying ideas of the two birthmark systems are similar, the differences in nature of the two programming languages led to different implementation designs.
published_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
10

Shaffer, Alan B. "An application of Alloy to static analysis for secure information flow and verification of software systems." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/dissert/2008/Dec/08Dec%5FShaffer_PhD.pdf.

Full text
Abstract:
Dissertation (Ph.D. in Computer Science)--Naval Postgraduate School, December 2008.
Dissertation Supervisor: Auguston, Mikhail. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 87-93). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Software and application security"

1

Ashbaugh, Douglas A. Security software development: Assessing and managing security risks. Boca Raton: Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Application security for the Android platform. Sebastopol, CA: O'Reilly, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Recx. Hands-on oracle application express security: Building secure apex applications. Indianapolis, Ind: Wiley, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shibamouli, Lahiri, ed. Network and application security fundamentals and practices. Enfield, NH: Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Spendolini, Scott. Expert Oracle Application Express Security. Berkeley, CA: Apress, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Merkow, Mark S. Secure and resilient software development. Boca Raton, FL: CRC Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Merkow, Mark S. Secure and resilient software development. Boca Raton, FL: CRC Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ramachandran, Dr Muthu. Software security engineering: Design and applications. Hauppauge, N. Y: New York : Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vincent, Liu, ed. Web application security: A beginner's guide. New York: McGraw-Hill, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Serrão, Carlos. Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Software and application security"

1

Harper, Dave. "Empirical Software Security Assurance." In Web Application Security, 11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bansal, Shonak, Krishna Parkash, Prince Jain, Sanjeev Kumar, Neena Gupta, and Arun K. Singh. "Photodetectors for Security Application." In Nanoelectronic Devices for Hardware and Software Security, 279–300. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sala, Adi, Marius Constantin Popescu, and Antoanela Naaji. "Software for Integral Security." In Soft Computing Applications, 285–93. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51992-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Desnos, Anthony, and Robert Erra. "Descriptional Entropy: Application to Security Software Analysis." In Lecture Notes in Computer Science, 225–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38227-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Belleville, Nicolas, Karine Heydemann, Damien Couroussé, Thierno Barry, Bruno Robisson, Abderrahmane Seriai, and Henri-Pierre Charles. "Automatic Application of Software Countermeasures Against Physical Attacks." In Cyber-Physical Systems Security, 135–55. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98935-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gollmann, Dieter. "Security in Distributed Applications." In Advances in Software Engineering, 254–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89762-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pan, Ping, Xuan Zhu, and Xinyue Mao. "Security Test for Application Software Based on SPN." In Advances in Intelligent Systems and Computing, 240–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60744-3_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Madou, Matias, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter, and Koen De Bosschere. "Software Protection Through Dynamic Code Mutation." In Information Security Applications, 194–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11604938_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lakhno, V., B. Akhmetov, V. Chubaievskyi, Alona Desiatko, K. Palaguta, A. Blozva, and Y. Chasnovskyi. "Information Security Audit Method Based on the Use of a Neuro-Fuzzy System." In Software Engineering Application in Informatics, 171–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90318-3_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Peng, Kun. "Paid and Anonymous Usage of Cloud Software." In Information Security Applications, 308–20. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65299-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software and application security"

1

Kantarcioglu, Murat. "Session details: Software Security." In CODASPY'15: Fifth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/3257827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chavan, A. Maurizio. "Web application security: CAS and beyond." In Software and Cyberinfrastructure for Astronomy V, edited by Juan C. Guzman and Jorge Ibsen. SPIE, 2018. http://dx.doi.org/10.1117/12.2312062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Jinqiu, Lin Tan, John Peyton, and Kristofer A Duer. "Towards Better Utilizing Static Application Security Testing." In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 2019. http://dx.doi.org/10.1109/icse-seip.2019.00014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Nan, FangMin Song, and Xiangdong Li. "Quantum searching application in search based software engineering." In SPIE Defense, Security, and Sensing, edited by Eric Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2013. http://dx.doi.org/10.1117/12.2018874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Valentine, Sidney, and Csilla Farkas. "Software security: Application-level vulnerabilities in SCADA systems." In Integration (IRI). IEEE, 2011. http://dx.doi.org/10.1109/iri.2011.6009603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elder, Sarah, Nusrat Zahan, Valeri Kozarev, Rui Shu, Tim Menzies, and Laurie Williams. "Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard." In 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET). IEEE, 2021. http://dx.doi.org/10.1109/icse-seet52601.2021.00019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Plauth, Max, Fredrik Teschke, Daniel Richter, and Andreas Polze. "Hardening Application Security Using Intel SGX." In 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2018. http://dx.doi.org/10.1109/qrs.2018.00050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ray, Indrakshi. "Session details: Session 3: Software Security." In CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3532564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Elsayed, Marwa A., and Mohammad Zulkernine. "Integrating Security in Cloud Application Development Cycle." In 2018 International Conference on Software Security and Assurance (ICSSA). IEEE, 2018. http://dx.doi.org/10.1109/icssa45270.2018.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Collberg, Christian, Sam Martin, Jonathan Myers, and Jasvir Nagra. "Distributed application tamper detection via continuous software updates." In the 28th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2420950.2420997.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Software and application security"

1

Alberts, Christopher, Julia Allen, and Robert Stoddard. Risk-Based Measurement and Analysis: Application to Software Security. Fort Belvoir, VA: Defense Technical Information Center, February 2012. http://dx.doi.org/10.21236/ada611106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Debray, Saumya. Topics in Low-Level Reverse Engineering, with Applications to Software Security. Fort Belvoir, VA: Defense Technical Information Center, January 2010. http://dx.doi.org/10.21236/ada567214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Razdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, April 2021. http://dx.doi.org/10.4271/epr2021009.

Full text
Abstract:
As automobiles morph from stand-alone mechanical objects to highly connected, autonomous systems with increasing amounts of electronic components. To manage these complex systems, some semblance of in-car decision-making is also being built and networked to a cloud architecture. This cloud can also enable even deeper capabilities within the broader automotive ecosystem. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software introduces the impact of software in advanced automotive applications, the role of open-source communities in accelerating innovation, and the important topic of safety and cybersecurity. As electronic functionality is captured in software and a bigger percentage of that software is open-source code, some critical challenges arise concerning security and validation.
APA, Harvard, Vancouver, ISO, and other styles
4

Souppaya, Murugiah, John Morello, and Karen Scarfone. Application container security guide. Gaithersburg, MD: National Institute of Standards and Technology, September 2017. http://dx.doi.org/10.6028/nist.sp.800-190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Birman, Ken, and Fred Schneider. Security Risks from a Software Monoculture. Fort Belvoir, VA: Defense Technical Information Center, November 2008. http://dx.doi.org/10.21236/ada492371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Evans, Rick. Invensys Foxboro Control Software Security Assessment. Office of Scientific and Technical Information (OSTI), February 2014. http://dx.doi.org/10.2172/1122068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Skalka, Christian. Trace Effect Analysis for Software Security. Fort Belvoir, VA: Defense Technical Information Center, February 2010. http://dx.doi.org/10.21236/ada515457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Miller, Barton P. Institute for Scalable Application Development Software. Office of Scientific and Technical Information (OSTI), November 2012. http://dx.doi.org/10.2172/1063806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McDonald, Jeffrey T. Foundations for Security Aware Software Development Education. Fort Belvoir, VA: Defense Technical Information Center, November 2005. http://dx.doi.org/10.21236/ada441224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography