Abstract:
In the commercial sector, security analysis has traditionally been applied at the network system level, after release, using tiger team approaches, After a successful tig...Show MoreMetadata
Abstract:
In the commercial sector, security analysis has traditionally been applied at the network system level, after release, using tiger team approaches, After a successful tiger team penetration, specific system vulnerabilities are patched. I make a case for applying software engineering analysis techniques that have proven successful in the software safety arena to security-critical software code. This work is based on the generally held belief that a large proportion of security violations result from errors introduced during software development.
Published in: IEEE Aerospace and Electronic Systems Magazine ( Volume: 13, Issue: 4, April 1998)
DOI: 10.1109/62.666831