Assuring software security against buffer overflow attacks in embedded software development life cycle

The Current attack techniques against embedded systems are used more sophisticated. Security has been the subject of intensive research in the area of embedded system. Embedded system developers should consider the security technology which protects, mitigates, and removes the vulnerabilities throug...

Full description

Saved in:
Bibliographic Details
Published in:2010 The 12th International Conference on Advanced Communication Technology (ICACT) Vol. 1; pp. 787 - 790
Main Authors: Chul Su Park, Jae Hee Lee, Seong Chae Seo, Byung Ki Kim
Format: Conference Proceeding
Language:English
Published: IEEE 01.02.2010
Subjects:
ISBN:1424454271, 9781424454273
ISSN:1738-9445
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The Current attack techniques against embedded systems are used more sophisticated. Security has been the subject of intensive research in the area of embedded system. Embedded system developers should consider the security technology which protects, mitigates, and removes the vulnerabilities throughout system development life cycle. This paper is intended to introduce embedded software analyzer to challenges involved in designing secure embedded systems against buffer overflow attacks. We attempt to provide a approach specifying of embedded software security requirements in the analysis phase of SDLC. It provides to understand, analyze, and specify the security requirements at an early phase of the software development.
AbstractList The Current attack techniques against embedded systems are used more sophisticated. Security has been the subject of intensive research in the area of embedded system. Embedded system developers should consider the security technology which protects, mitigates, and removes the vulnerabilities throughout system development life cycle. This paper is intended to introduce embedded software analyzer to challenges involved in designing secure embedded systems against buffer overflow attacks. We attempt to provide a approach specifying of embedded software security requirements in the analysis phase of SDLC. It provides to understand, analyze, and specify the security requirements at an early phase of the software development.
Author Seong Chae Seo
Jae Hee Lee
Chul Su Park
Byung Ki Kim
Author_xml – sequence: 1
  surname: Chul Su Park
  fullname: Chul Su Park
  email: av3616@chonnam.ac.kr
  organization: Dept. of Comput. Sci., Chonnam Nat. Univ., Gwangju, South Korea
– sequence: 2
  surname: Jae Hee Lee
  fullname: Jae Hee Lee
  email: jaehee@chonnam.ac.kr
  organization: Dept. of Comput. Sci., Chonnam Nat. Univ., Gwangju, South Korea
– sequence: 3
  surname: Seong Chae Seo
  fullname: Seong Chae Seo
  email: scseo@chonnam.ac.kr
  organization: Dept. of Comput. Sci., Chonnam Nat. Univ., Gwangju, South Korea
– sequence: 4
  surname: Byung Ki Kim
  fullname: Byung Ki Kim
  email: bgkim@chonnam.ac.kr
  organization: Dept. of Comput. Sci., Chonnam Nat. Univ., Gwangju, South Korea
BookMark eNpFjM1qAyEURi1NoUk6T9CNLzCgo87oMoT-QaCbdh10vDfYzjhBTcK8fQMtdPVxDpxvRRZxinBDKtNpbZTihsu2uSUrLhsplWw6viBL3gldmyvfkyrnL8aYYJyxRiwJbnI-pRAPNE9YLjYBzdBfTZmpPdgQc6HuhAiJTmdIOEwXakux_XemIVIYHXgP_r_2cIZhOo4QCx0CAu3nfoAHcod2yFD97Zp8Pj99bF_r3fvL23azqwPvVKlbhtra3qHpmTdWtcpIp6w3HL1CYEzqznPXKcHAOnAeG4OyBQ7egAIp1uTx9zcAwP6YwmjTvFdSMq6F-AH7Xlkp
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9788955191462
9781424454280
142445428X
8955191464
EndPage 790
ExternalDocumentID 5440183
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i175t-60f8aacbf9c0d9a56594b5ad91fd5fe00487d1b7530eabebdf29f46e1ed9e5e43
IEDL.DBID RIE
ISBN 1424454271
9781424454273
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000397335200144&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1738-9445
IngestDate Wed Aug 27 03:18:11 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-60f8aacbf9c0d9a56594b5ad91fd5fe00487d1b7530eabebdf29f46e1ed9e5e43
PageCount 4
ParticipantIDs ieee_primary_5440183
PublicationCentury 2000
PublicationDate 2010-Feb.
PublicationDateYYYYMMDD 2010-02-01
PublicationDate_xml – month: 02
  year: 2010
  text: 2010-Feb.
PublicationDecade 2010
PublicationTitle 2010 The 12th International Conference on Advanced Communication Technology (ICACT)
PublicationTitleAbbrev ICACT
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003010023
ssj0001967609
Score 1.4537091
Snippet The Current attack techniques against embedded systems are used more sophisticated. Security has been the subject of intensive research in the area of embedded...
SourceID ieee
SourceType Publisher
StartPage 787
SubjectTerms Best practices
Buffer overflow
buffer overfolw
Data security
Embedded software
Embedded system
Information security
modelling
National security
Programming
Protection
SDLC
security requirement
Software systems
Title Assuring software security against buffer overflow attacks in embedded software development life cycle
URI https://ieeexplore.ieee.org/document/5440183
Volume 1
WOSCitedRecordID wos000397335200144&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED61FQMsPFrEWx4YCSS1HcczomJAVQdA3So7PqOg0qI2peLfYzuhAYmFLbFkKbr4Hr77vjuAS2nTqvRPkauQuomkM4oR1dxwRqnMAnj8-UEMh9l4LEctuNpwYRAxgM_w2j-GWr6Z5yufKrvhzN0GMtqGthCi4mo1-RSZirRuRfVaRfreHwU-pNdpxvg3r4uzvki-2z3V7_TXdJXgXAa7__usPeg1LD0y2viffWjh7AB2fjQY7IJ10g88RLJ05natFkiW9cA6ol5U4WJDold-RArxUE47na-JKkvPuyfFjOCbRmeYTLPbNBgjMi0skvzTnbsePA3uHm_vo3qyQlS4cKGM0thmSuXayjw2UrmgTjLNlZGJNdyiV2thEu2uMjEqjdrYvrQsxQSNRI6MHkJnNp_hERCZqMRpvVWxcOvUaubOBO8rndFUslQfQ9dLbPJeNc-Y1MI6-Xv5FLar8rzHi5xBp1ys8By28o-yWC4uwh__AsBEqmE
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZKQQIWHi3ijQdGAklsJ_GMqECUqkNB3So7PqOgkqI2peLfYztpAxILm2MpUnTxPXz3fXcIXXIdlaV_Aky41I3HjVH0iGSKUUJ44sDjL92410uGQ95voKsVFwYAHPgMru3S1fLVJJ3bVNkNo-Y2kJA1tG5WYVCyteqMCo_iqGpG9VbG-tYjOUak1WpK2ZLZxWgYB8uGT9Uz-TVfxbmXzs7_PmwXtWueHu6vPNAeakC-j7Z_tBhsIW3k75iIeGYM7kJMAc-qkXVYvIrMRIdYzu2QFGzBnHo8WWBRFJZ5j7Mcw7sEY5pU_baqUUZ4nGnA6Zc5eW303Lkb3N571WwFLzMBQ-FFvk6ESKXmqa-4MGEdp5IJxQOtmAar2LEKpLnM-CAkSKVDrmkEASgODCg5QM18ksMhwjwQgdF7LfzY7BMtqTkVLBQyIRGnkTxCLSux0UfZPmNUCev47-0LtHk_eOqOug-9xxO0VRbrLXrkFDWL6RzO0Eb6WWSz6bn7-9_KNa2o
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+The+12th+International+Conference+on+Advanced+Communication+Technology+%28ICACT%29&rft.atitle=Assuring+software+security+against+buffer+overflow+attacks+in+embedded+software+development+life+cycle&rft.au=Chul+Su+Park&rft.au=Jae+Hee+Lee&rft.au=Seong+Chae+Seo&rft.au=Byung+Ki+Kim&rft.date=2010-02-01&rft.pub=IEEE&rft.isbn=9781424454273&rft.issn=1738-9445&rft.volume=1&rft.spage=787&rft.epage=790&rft.externalDocID=5440183
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-9445&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-9445&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-9445&client=summon