Software vulnerabilities are the prime cause for the
cyber attacks and potential misuse of software applications.
The vulnerabilities are mostly due to unsecure system
architecture, software development language and design
issues. Generally software development practice does not
address these issues due to time-budget constraints and
conflicting needs. This ultimately results in software
development, where security is a major concern, remains
mainly unnoticed. Secure software engineering by and large
refers to the process of software security. The software security
essentially focuses on developing the secure software, which
generally depends on system architecture and software
security assurance against the possible vulnerabilities. To
address these issues, in this paper, a survey is reported as a
state of art work in the areas of secure system architecture,
buffer overflow attacks and confinement.
%0 Generic
%1 mishra2013secure
%A Mishra, Arun
%A Dixit, Arati M
%B 2013 Mobile Communication - I
%D 2013
%E Das, Dr.Vinu V
%I ACEEE (A Computer division of IDES)
%K Architecture Buffer Confinement Overflow Secure Software Verification
%T A Secure Software Engineering Perspective
%U http://searchdl.org/public/book_series/LSCS/2/582.pdf
%X Software vulnerabilities are the prime cause for the
cyber attacks and potential misuse of software applications.
The vulnerabilities are mostly due to unsecure system
architecture, software development language and design
issues. Generally software development practice does not
address these issues due to time-budget constraints and
conflicting needs. This ultimately results in software
development, where security is a major concern, remains
mainly unnoticed. Secure software engineering by and large
refers to the process of software security. The software security
essentially focuses on developing the secure software, which
generally depends on system architecture and software
security assurance against the possible vulnerabilities. To
address these issues, in this paper, a survey is reported as a
state of art work in the areas of secure system architecture,
buffer overflow attacks and confinement.
@conference{mishra2013secure,
abstract = {Software vulnerabilities are the prime cause for the
cyber attacks and potential misuse of software applications.
The vulnerabilities are mostly due to unsecure system
architecture, software development language and design
issues. Generally software development practice does not
address these issues due to time-budget constraints and
conflicting needs. This ultimately results in software
development, where security is a major concern, remains
mainly unnoticed. Secure software engineering by and large
refers to the process of software security. The software security
essentially focuses on developing the secure software, which
generally depends on system architecture and software
security assurance against the possible vulnerabilities. To
address these issues, in this paper, a survey is reported as a
state of art work in the areas of secure system architecture,
buffer overflow attacks and confinement.},
added-at = {2014-02-06T05:54:38.000+0100},
author = {Mishra, Arun and Dixit, Arati M},
biburl = {https://www.bibsonomy.org/bibtex/225f7eadafbb98977abd4966ee99a208d/idescitation},
booktitle = {2013 Mobile Communication - I},
editor = {Das, Dr.Vinu V},
interhash = {3e38294192daefe57a1e6c777bf3e145},
intrahash = {25f7eadafbb98977abd4966ee99a208d},
keywords = {Architecture Buffer Confinement Overflow Secure Software Verification},
organization = {Institute of Doctors Engineers and Scientists},
publisher = {ACEEE (A Computer division of IDES)},
timestamp = {2014-02-06T05:54:38.000+0100},
title = {A Secure Software Engineering Perspective},
url = {http://searchdl.org/public/book_series/LSCS/2/582.pdf},
year = 2013
}