Assuring software security against buffer overflow attacks in embedded software development life cycle
The Current attack techniques against embedded systems are used more sophisticated. Security has been the subject of intensive research in the area of embedded system. Embedded system developers should consider the security technology which protects, mitigates, and removes the vulnerabilities throug...
Saved in:
| Published in: | 2010 The 12th International Conference on Advanced Communication Technology (ICACT) Vol. 1; pp. 787 - 790 |
|---|---|
| Main Authors: | , , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.02.2010
|
| Subjects: | |
| ISBN: | 1424454271, 9781424454273 |
| ISSN: | 1738-9445 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The Current attack techniques against embedded systems are used more sophisticated. Security has been the subject of intensive research in the area of embedded system. Embedded system developers should consider the security technology which protects, mitigates, and removes the vulnerabilities throughout system development life cycle. This paper is intended to introduce embedded software analyzer to challenges involved in designing secure embedded systems against buffer overflow attacks. We attempt to provide a approach specifying of embedded software security requirements in the analysis phase of SDLC. It provides to understand, analyze, and specify the security requirements at an early phase of the software development. |
|---|---|
| AbstractList | The Current attack techniques against embedded systems are used more sophisticated. Security has been the subject of intensive research in the area of embedded system. Embedded system developers should consider the security technology which protects, mitigates, and removes the vulnerabilities throughout system development life cycle. This paper is intended to introduce embedded software analyzer to challenges involved in designing secure embedded systems against buffer overflow attacks. We attempt to provide a approach specifying of embedded software security requirements in the analysis phase of SDLC. It provides to understand, analyze, and specify the security requirements at an early phase of the software development. |
| Author | Seong Chae Seo Jae Hee Lee Chul Su Park Byung Ki Kim |
| Author_xml | – sequence: 1 surname: Chul Su Park fullname: Chul Su Park email: av3616@chonnam.ac.kr organization: Dept. of Comput. Sci., Chonnam Nat. Univ., Gwangju, South Korea – sequence: 2 surname: Jae Hee Lee fullname: Jae Hee Lee email: jaehee@chonnam.ac.kr organization: Dept. of Comput. Sci., Chonnam Nat. Univ., Gwangju, South Korea – sequence: 3 surname: Seong Chae Seo fullname: Seong Chae Seo email: scseo@chonnam.ac.kr organization: Dept. of Comput. Sci., Chonnam Nat. Univ., Gwangju, South Korea – sequence: 4 surname: Byung Ki Kim fullname: Byung Ki Kim email: bgkim@chonnam.ac.kr organization: Dept. of Comput. Sci., Chonnam Nat. Univ., Gwangju, South Korea |
| BookMark | eNpFjM1qAyEURi1NoUk6T9CNLzCgo87oMoT-QaCbdh10vDfYzjhBTcK8fQMtdPVxDpxvRRZxinBDKtNpbZTihsu2uSUrLhsplWw6viBL3gldmyvfkyrnL8aYYJyxRiwJbnI-pRAPNE9YLjYBzdBfTZmpPdgQc6HuhAiJTmdIOEwXakux_XemIVIYHXgP_r_2cIZhOo4QCx0CAu3nfoAHcod2yFD97Zp8Pj99bF_r3fvL23azqwPvVKlbhtra3qHpmTdWtcpIp6w3HL1CYEzqznPXKcHAOnAeG4OyBQ7egAIp1uTx9zcAwP6YwmjTvFdSMq6F-AH7Xlkp |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9788955191462 9781424454280 142445428X 8955191464 |
| EndPage | 790 |
| ExternalDocumentID | 5440183 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL RNS |
| ID | FETCH-LOGICAL-i175t-60f8aacbf9c0d9a56594b5ad91fd5fe00487d1b7530eabebdf29f46e1ed9e5e43 |
| IEDL.DBID | RIE |
| ISBN | 1424454271 9781424454273 |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000397335200144&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1738-9445 |
| IngestDate | Wed Aug 27 03:18:11 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-60f8aacbf9c0d9a56594b5ad91fd5fe00487d1b7530eabebdf29f46e1ed9e5e43 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_5440183 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-Feb. |
| PublicationDateYYYYMMDD | 2010-02-01 |
| PublicationDate_xml | – month: 02 year: 2010 text: 2010-Feb. |
| PublicationDecade | 2010 |
| PublicationTitle | 2010 The 12th International Conference on Advanced Communication Technology (ICACT) |
| PublicationTitleAbbrev | ICACT |
| PublicationYear | 2010 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0003010023 ssj0001967609 |
| Score | 1.4537091 |
| Snippet | The Current attack techniques against embedded systems are used more sophisticated. Security has been the subject of intensive research in the area of embedded... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 787 |
| SubjectTerms | Best practices Buffer overflow buffer overfolw Data security Embedded software Embedded system Information security modelling National security Programming Protection SDLC security requirement Software systems |
| Title | Assuring software security against buffer overflow attacks in embedded software development life cycle |
| URI | https://ieeexplore.ieee.org/document/5440183 |
| Volume | 1 |
| WOSCitedRecordID | wos000397335200144&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED61FQMsPFrEWx4YCSS1HcczomJAVQdA3So7PqOg0qI2peLfYzuhAYmFLbFkKbr4Hr77vjuAS2nTqvRPkauQuomkM4oR1dxwRqnMAnj8-UEMh9l4LEctuNpwYRAxgM_w2j-GWr6Z5yufKrvhzN0GMtqGthCi4mo1-RSZirRuRfVaRfreHwU-pNdpxvg3r4uzvki-2z3V7_TXdJXgXAa7__usPeg1LD0y2viffWjh7AB2fjQY7IJ10g88RLJ05natFkiW9cA6ol5U4WJDold-RArxUE47na-JKkvPuyfFjOCbRmeYTLPbNBgjMi0skvzTnbsePA3uHm_vo3qyQlS4cKGM0thmSuXayjw2UrmgTjLNlZGJNdyiV2thEu2uMjEqjdrYvrQsxQSNRI6MHkJnNp_hERCZqMRpvVWxcOvUaubOBO8rndFUslQfQ9dLbPJeNc-Y1MI6-Xv5FLar8rzHi5xBp1ys8By28o-yWC4uwh__AsBEqmE |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZKQQIWHi3ijQdGAklsJ_GMqECUqkNB3So7PqOgkqI2peLfYztpAxILm2MpUnTxPXz3fXcIXXIdlaV_Aky41I3HjVH0iGSKUUJ44sDjL92410uGQ95voKsVFwYAHPgMru3S1fLVJJ3bVNkNo-Y2kJA1tG5WYVCyteqMCo_iqGpG9VbG-tYjOUak1WpK2ZLZxWgYB8uGT9Uz-TVfxbmXzs7_PmwXtWueHu6vPNAeakC-j7Z_tBhsIW3k75iIeGYM7kJMAc-qkXVYvIrMRIdYzu2QFGzBnHo8WWBRFJZ5j7Mcw7sEY5pU_baqUUZ4nGnA6Zc5eW303Lkb3N571WwFLzMBQ-FFvk6ESKXmqa-4MGEdp5IJxQOtmAar2LEKpLnM-CAkSKVDrmkEASgODCg5QM18ksMhwjwQgdF7LfzY7BMtqTkVLBQyIRGnkTxCLSux0UfZPmNUCev47-0LtHk_eOqOug-9xxO0VRbrLXrkFDWL6RzO0Eb6WWSz6bn7-9_KNa2o |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+The+12th+International+Conference+on+Advanced+Communication+Technology+%28ICACT%29&rft.atitle=Assuring+software+security+against+buffer+overflow+attacks+in+embedded+software+development+life+cycle&rft.au=Chul+Su+Park&rft.au=Jae+Hee+Lee&rft.au=Seong+Chae+Seo&rft.au=Byung+Ki+Kim&rft.date=2010-02-01&rft.pub=IEEE&rft.isbn=9781424454273&rft.issn=1738-9445&rft.volume=1&rft.spage=787&rft.epage=790&rft.externalDocID=5440183 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-9445&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-9445&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-9445&client=summon |

