Software security
Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking's importance, but they need some help in understanding how to tackle it. The article aims to provide that help by exploring so...
Gespeichert in:
| Veröffentlicht in: | IEEE security & privacy Jg. 2; H. 2; S. 80 - 83 |
|---|---|
| 1. Verfasser: | |
| Format: | Magazine Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
IEEE
01.03.2004
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Schlagworte: | |
| ISSN: | 1540-7993, 1558-4046 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking's importance, but they need some help in understanding how to tackle it. The article aims to provide that help by exploring software security best practices. A central and critical aspect of the computer security problem is a software problem. Software defects with security ramifications, including implementation bugs such as buffer overflows and design flaws such as inconsistent error handling, promise to be with us for years. All too often, malicious intruders can hack into systems by exploiting software defects. Internet-enabled software applications present the most common security risk encountered today, with software's ever-expanding complexity and extensibility adding further fuel to the fire. By any measure, security holes in software are common, and the problem is growing. |
|---|---|
| AbstractList | Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking's importance, but they need some help in understanding how to tackle it. The article aims to provide that help by exploring software security best practices. A central and critical aspect of the computer security problem is a software problem. Software defects with security ramifications, including implementation bugs such as buffer overflows and design flaws such as inconsistent error handling, promise to be with us for years. All too often, malicious intruders can hack into systems by exploiting software defects. Internet-enabled software applications present the most common security risk encountered today, with software's ever-expanding complexity and extensibility adding further fuel to the fire. By any measure, security holes in software are common, and the problem is growing. |
| Author | McGraw, G. |
| Author_xml | – sequence: 1 givenname: G. surname: McGraw fullname: McGraw, G. |
| BookMark | eNp9kE1LAzEQhoNUsK0evOpFPOhpaybZdCdHWeoHVBSq55CkCWzZ7tZkF-m_d9cWhB56moF53hnmGZFBVVeOkCugEwAqH94Ws_xjwihNJ8AQmEhPyBCEwCSl6XTQ9ylNMin5GRnFuKKUAQgckstF7ZsfHdxNdLYNRbM9J6del9Fd7OuYfD3NPvOXZP7-_Jo_zhPLhWgSabRBtOgMUHDcG4fWMm8sGO811YwLnwFnzHGB4FFYPjVLajBdamtlxsfkfrd3E-rv1sVGrYtoXVnqytVtVJLCVEjJsCPvjpIMswxFyjrw9gBc1W2oui-UZBSRU9ZDbAfZUMcYnFebUKx12Cqgqpep_mSqXqbay-xCeBCyRaOboq6aoIvyePR6Fy2cc_-39tNf_QOCVw |
| CODEN | ISPMCN |
| CitedBy_id | crossref_primary_10_1109_TII_2019_2945520 crossref_primary_10_1016_j_jss_2023_111907 crossref_primary_10_1007_s10207_013_0208_7 crossref_primary_10_4018_ijsi_2014070103 crossref_primary_10_1109_MSEC_2019_2918820 crossref_primary_10_1007_s11042_016_4216_2 crossref_primary_10_1007_s42979_023_01968_x crossref_primary_10_3233_WEB_210452 crossref_primary_10_1016_j_infsof_2014_09_001 crossref_primary_10_1007_s10664_018_9646_1 crossref_primary_10_1016_j_procs_2024_06_307 crossref_primary_10_1002_admt_202001073 crossref_primary_10_1080_19393555_2010_483929 crossref_primary_10_1016_j_jss_2024_112031 crossref_primary_10_1002_adma_202504288 crossref_primary_10_1007_s12209_009_0029_y crossref_primary_10_3390_s23041805 crossref_primary_10_1109_JIOT_2023_3297259 crossref_primary_10_1145_2667218 crossref_primary_10_1109_TSE_2022_3207149 crossref_primary_10_1108_ICS_12_2018_0138 crossref_primary_10_1109_MCC_2016_5 crossref_primary_10_1016_j_cose_2016_03_009 crossref_primary_10_1016_j_jisa_2025_103989 crossref_primary_10_1080_19393550802623206 crossref_primary_10_1007_s41870_024_02002_w crossref_primary_10_1109_MSEC_2020_2969064 crossref_primary_10_1109_ACCESS_2023_3315595 crossref_primary_10_4018_IJSSMET_2020100103 crossref_primary_10_7717_peerj_cs_376 crossref_primary_10_1016_j_infsof_2024_107453 crossref_primary_10_1109_TIFS_2024_3393748 crossref_primary_10_1007_s41449_022_00346_2 crossref_primary_10_3390_s21010028 crossref_primary_10_1016_j_cose_2006_09_002 crossref_primary_10_3390_electronics12173594 crossref_primary_10_1007_s10515_022_00331_3 crossref_primary_10_1007_s10639_018_9758_7 crossref_primary_10_1016_j_cosrev_2023_100551 crossref_primary_10_1080_19361610_2014_913230 crossref_primary_10_1109_ACCESS_2020_3040220 crossref_primary_10_1002_stvr_1580 crossref_primary_10_1145_3301305 crossref_primary_10_1007_s10009_015_0371_4 crossref_primary_10_1002_smr_2648 crossref_primary_10_1007_s10664_023_10287_x crossref_primary_10_1007_s10664_024_10496_y crossref_primary_10_1142_S0218539324500311 crossref_primary_10_1109_MSP_2004_55 crossref_primary_10_1109_JIOT_2019_2947339 crossref_primary_10_1145_2897441 crossref_primary_10_1109_MSP_2005_23 crossref_primary_10_1145_1543405_1543411 crossref_primary_10_3745_KIPSTD_2006_13D_1_067 crossref_primary_10_1038_s42005_019_0139_3 crossref_primary_10_1109_MSP_2004_111 crossref_primary_10_3390_s23177532 crossref_primary_10_1145_3410337 crossref_primary_10_1109_MSP_2004_84 crossref_primary_10_1109_ACCESS_2025_3602480 crossref_primary_10_1016_j_jss_2023_111679 crossref_primary_10_1007_s10664_021_10019_z crossref_primary_10_1145_3638531 crossref_primary_10_3390_electronics11223707 crossref_primary_10_1016_j_procs_2015_08_155 crossref_primary_10_1016_j_cose_2016_08_002 crossref_primary_10_1145_3589951 crossref_primary_10_1002_sec_1700 crossref_primary_10_1109_MSP_2011_40 crossref_primary_10_4028_www_scientific_net_AMM_182_183_2085 crossref_primary_10_1016_j_datak_2025_102443 crossref_primary_10_1109_ACCESS_2021_3052311 crossref_primary_10_1016_j_scico_2022_102768 crossref_primary_10_1109_MSP_2005_45 crossref_primary_10_1016_j_csi_2016_10_001 crossref_primary_10_1109_TSC_2022_3195071 crossref_primary_10_1016_j_jss_2024_112062 crossref_primary_10_1088_1742_6596_1530_1_012007 crossref_primary_10_1007_s10515_023_00385_x crossref_primary_10_1007_s11771_009_0044_0 crossref_primary_10_1002_sec_1374 crossref_primary_10_1142_S0218194025500408 crossref_primary_10_1145_1595453_1595484 crossref_primary_10_1007_s11859_012_0880_x crossref_primary_10_1109_TDSC_2021_3095417 crossref_primary_10_32604_cmc_2020_013854 crossref_primary_10_1007_s10664_025_10649_7 crossref_primary_10_1016_j_jss_2016_12_006 crossref_primary_10_3390_en14082161 crossref_primary_10_3390_s19020334 crossref_primary_10_1109_ACCESS_2022_3216395 crossref_primary_10_1126_science_1168661 crossref_primary_10_4018_IJSSSP_2020010103 crossref_primary_10_4028_www_scientific_net_AMR_631_632_1390 crossref_primary_10_1016_j_jss_2022_111283 crossref_primary_10_1109_MSP_2005_60 crossref_primary_10_1016_j_ijhcs_2006_08_003 crossref_primary_10_1109_MSP_2004_95 crossref_primary_10_1109_OJCOMS_2024_3356076 crossref_primary_10_1109_TSE_2007_70712 crossref_primary_10_1007_s10207_023_00669_z crossref_primary_10_1016_j_cose_2012_04_005 crossref_primary_10_1016_j_hrmr_2012_06_010 |
| Cites_doi | 10.1109/MSECP.2003.1193213 10.1109/MSECP.2003.1176996 10.1109/MSECP.2003.1253571 10.1109/62.666831 10.1109/MS.2002.1049391 |
| ContentType | Magazine Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004 |
| DBID | RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D 7SP F28 FR3 |
| DOI | 10.1109/MSECP.2004.1281254 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Electronics & Communications Abstracts ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional Electronics & Communications Abstracts Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Technology Research Database Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1558-4046 |
| EndPage | 83 |
| ExternalDocumentID | 2583182841 10_1109_MSECP_2004_1281254 1281254 |
| Genre | orig-research |
| GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAVXG AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AETIX AFOGA AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IEDLZ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNI RNS RZB AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D 7SP F28 FR3 |
| ID | FETCH-LOGICAL-c355t-9bab88c8eb101e3fbe8cc2fbc1bffa0a235f71322e3581f85c36bd0b84dacc973 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 220 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000227718400019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1540-7993 |
| IngestDate | Mon Sep 29 06:40:59 EDT 2025 Sun Sep 28 06:13:53 EDT 2025 Sun Oct 05 00:09:45 EDT 2025 Sat Nov 29 08:10:09 EST 2025 Tue Nov 18 22:18:56 EST 2025 Wed Aug 27 02:49:40 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Issue | 2 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c355t-9bab88c8eb101e3fbe8cc2fbc1bffa0a235f71322e3581f85c36bd0b84dacc973 |
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 content type line 23 |
| PQID | 920883022 |
| PQPubID | 23500 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_1281254 proquest_miscellaneous_901659928 proquest_miscellaneous_28778542 crossref_primary_10_1109_MSECP_2004_1281254 proquest_journals_920883022 crossref_citationtrail_10_1109_MSECP_2004_1281254 |
| PublicationCentury | 2000 |
| PublicationDate | 2004-03-01 |
| PublicationDateYYYYMMDD | 2004-03-01 |
| PublicationDate_xml | – month: 03 year: 2004 text: 2004-03-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE security & privacy |
| PublicationTitleAbbrev | SECP-M |
| PublicationYear | 2004 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref4 Viega (ref2) 2001 ref3 ref6 s1ref2 s1ref1 s1ref3 Walsh (ref5) 2003 Hoglund (ref1) 2004 |
| References_xml | – volume-title: Building Secure Software year: 2001 ident: ref2 – ident: ref3 doi: 10.1109/MSECP.2003.1193213 – ident: s1ref2 doi: 10.1109/MSECP.2003.1193213 – ident: ref6 doi: 10.1109/MSECP.2003.1176996 – volume-title: Information Security Magazine year: 2003 ident: ref5 article-title: Trustworthy Yet? – ident: s1ref1 doi: 10.1109/MSECP.2003.1253571 – ident: ref4 doi: 10.1109/62.666831 – volume-title: Exploiting Software: How to Break Code year: 2004 ident: ref1 – ident: s1ref3 doi: 10.1109/MS.2002.1049391 |
| SSID | ssj0021158 |
| Score | 1.2043679 |
| SecondaryResourceType | review_article |
| Snippet | Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 80 |
| SubjectTerms | Application software Best practices Buffer overflow Computer bugs Computer errors Computer hacking Computer information security Computer programs Computer security Defects Extensibility Fuels Internet Materials handling Risk Software Software systems Technologists |
| Title | Software security |
| URI | https://ieeexplore.ieee.org/document/1281254 https://www.proquest.com/docview/920883022 https://www.proquest.com/docview/28778542 https://www.proquest.com/docview/901659928 |
| Volume | 2 |
| WOSCitedRecordID | wos000227718400019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LS8MwGP_YhgdPm05xzkcP3rRb2qRNcpTh8OIYTGG3kqQJCLLJuum_b5I-RHyAt9J-bZOvyffo9_gBXFkrgCNJdJggmYSEyjwUVvOFiAiscZwbHecebILOZmy55PMW3DS1MFprn3ymR-7Qx_Lztdq5X2VjF_WxDk0b2pSmZa1W41xZy8aXvblAP7VKty6QQXz8sLibzL0rOKqe8EUJeVSVb6LY65dp938j60G37gsd3JZf_gBaenUI3RqkIaj2bB96Cyto38VGB0UFVXcET9O7x8l9WOEghMpaA9uQSyEZU8yKVRRpbKRmSsVGqkgaI5CIcWKo8yq1a2ZmWKJwKnMkGcmFUpziY-is1it9AgFOFUkxjbi1i4g2iTACOyMxlkgQRdgAopoxmaqahDusipfMOwuIZ56ZDrySZNWkB3Dd3PNatsj4k7rv2PdJWZ8e1vzPql1UZDy2MhBbK2MAl81Vu_xdTEOs9HpXZNbhoywhliL4hYK7gi07Q3b685uHsF9m47i8sjPobDc7fQ576m37XGwu_CL7AJ0-zPk |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bT8IwFD5BNNEnUDQiKnvwTQdl7Vj7aAgEIxASMOFtabs2MTHDMNC_b1s2jPGS-LZsZ5ee7dx2Lh_AjfECGBJE-SESoU8ikfjcWD4fEY4VDhKtgsSBTUSTCV0s2LQEd7teGKWUKz5TLbvpcvnJUm7sr7K2zfqYgGYP9i1yVt6ttQuvjG_jGt9sqj8yZrdokUGsPZ71e1MXDLbya3wxQw5X5ZsydhZmUPnfs1WhUkyG9u637_4YSio9gUoB0-DlUluD6syo2ne-Ul6Wg9WdwtOgP-8N_RwJwZfGH1j7THBBqaRGsaKOwlooKmWghewIrTniAQ51ZONKZceZaRpK3BUJEpQkXEoW4TMop8tUnYOHu5J0cdRhxjMiSodcc2zdxEAgTiShdegUjIllPibcolW8xC5cQCx2zLTwlSTOF12H2905r9shGX9S1yz7PimL3Y2C_3EuR1nMAqMFsfEz6tDcHTUCYLMaPFXLTRabkC-iITEU3i8UzLZsmRXSi5_v3ITD4Xw8ikcPk8cGHG1rc2yV2SWU16uNuoID-bZ-zlbX7oP7AHdX0EI |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Software+security&rft.jtitle=IEEE+security+%26+privacy&rft.au=McGraw%2C+G&rft.date=2004-03-01&rft.issn=1540-7993&rft.volume=2&rft.issue=2&rft.spage=80&rft.epage=83&rft_id=info:doi/10.1109%2FMSECP.2004.1281254&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1540-7993&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1540-7993&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1540-7993&client=summon |