Secure Software Development: Issues and Challenges
- URL: http://arxiv.org/abs/2311.11021v1
- Date: Sat, 18 Nov 2023 09:44:48 GMT
- Title: Secure Software Development: Issues and Challenges
- Authors: Sam Wen Ping, Jeffrey Cheok Jun Wah, Lee Wen Jie, Jeremy Bong Yong Han
and Saira Muzafar
- Abstract summary: The digitization of our lives proves to solve our human problems as well as improve quality of life.
Hackers aim to steal the data of innocent people to use it for other causes such as identity fraud, scams and many more.
The goal of a secured system software is to prevent such exploitations from ever happening by conducting a system life cycle.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: In recent years, technology has advanced considerably with the introduction
of many systems including advanced robotics, big data analytics, cloud
computing, machine learning and many more. The opportunities to exploit the yet
to come security that comes with these systems are going toe to toe with new
releases of security protocols to combat this exploitation to provide a secure
system. The digitization of our lives proves to solve our human problems as
well as improve quality of life but because it is digitalized, information and
technology could be misused for other malicious gains. Hackers aim to steal the
data of innocent people to use it for other causes such as identity fraud,
scams and many more. This issue can be corrected during the software
development life cycle, integrating security across the development phases, and
testing of the software is done early to reduce the number of vulnerabilities
that might or might not heavily impact an organisation depending on the range
of the attack. The goal of a secured system software is to prevent such
exploitations from ever happening by conducting a system life cycle where
through planning and testing is done to maximise security while maintaining
functionality of the system. In this paper, we are going to discuss the recent
trends in security for system development as well as our predictions and
suggestions to improve the current security practices in this industry.
Related papers
- Software Security Analysis in 2030 and Beyond: A Research Roadmap [19.58506360935285]
We need new methods to evaluate and maximize the security of code co-written by machines.
As software systems become increasingly heterogeneous, we need approaches that work even if some functions are automatically generated.
We start our research roadmap with a survey of recent advances in software security, then discuss open challenges and opportunities, and conclude with a long-term perspective for the field.
arXiv Detail & Related papers (2024-09-26T13:50:41Z) - Software Repositories and Machine Learning Research in Cyber Security [0.0]
The integration of robust cyber security defenses has become essential across all phases of software development.
Attempts have been made to leverage topic modeling and machine learning for the detection of these early-stage vulnerabilities in the software requirements process.
arXiv Detail & Related papers (2023-11-01T17:46:07Z) - Leveraging Traceability to Integrate Safety Analysis Artifacts into the
Software Development Process [51.42800587382228]
Safety assurance cases (SACs) can be challenging to maintain during system evolution.
We propose a solution that leverages software traceability to connect relevant system artifacts to safety analysis models.
We elicit design rationales for system changes to help safety stakeholders analyze the impact of system changes on safety.
arXiv Detail & Related papers (2023-07-14T16:03:27Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Security for Machine Learning-based Software Systems: a survey of
threats, practices and challenges [0.76146285961466]
How to securely develop the machine learning-based modern software systems (MLBSS) remains a big challenge.
latent vulnerabilities and privacy issues exposed to external users and attackers will be largely neglected and hard to be identified.
We consider that security for machine learning-based software systems may arise from inherent system defects or external adversarial attacks.
arXiv Detail & Related papers (2022-01-12T23:20:25Z) - A Research Ecosystem for Secure Computing [4.212354651854757]
Security of computers, systems, and applications has been an active area of research in computer science for decades.
Challenges range from security and trust of the information ecosystem to adversarial artificial intelligence and machine learning.
New incentives and education are at the core of this change.
arXiv Detail & Related papers (2021-01-04T22:42:28Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Trustworthy AI Inference Systems: An Industry Research View [58.000323504158054]
We provide an industry research view for approaching the design, deployment, and operation of trustworthy AI inference systems.
We highlight opportunities and challenges in AI systems using trusted execution environments.
We outline areas of further development that require the global collective attention of industry, academia, and government researchers.
arXiv Detail & Related papers (2020-08-10T23:05:55Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.