When the Software Goes Beyond its Requirements -- A Software Security Perspective

Jing-Chiou Liou
{"title":"When the Software Goes Beyond its Requirements -- A Software Security Perspective","authors":"Jing-Chiou Liou","doi":"10.1109/ITNG.2012.98","DOIUrl":null,"url":null,"abstract":"Evidences from current events have shown that, in addition to virus and hacker attacks, many software systems have been embedded with \"agents\" that pose security threats such as allowing someone to \"invade\" into computers with such software installed. This will eventually grow into a more serious problem when Cluster and Cloud Computing becomes popular. As this is an area that few have been exploring, we discuss in this paper the issue of software security breaches resulting from embedded sleeping agents. We also investigate some patterns of embedded sleeping agents utilized in software industry. In addition, we review these patterns and propose a security model that identifies different scenarios. This security model will provide a foundation for further study on how to detect and prevent such patterns from becoming security breaches.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Ninth International Conference on Information Technology - New Generations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNG.2012.98","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Evidences from current events have shown that, in addition to virus and hacker attacks, many software systems have been embedded with "agents" that pose security threats such as allowing someone to "invade" into computers with such software installed. This will eventually grow into a more serious problem when Cluster and Cloud Computing becomes popular. As this is an area that few have been exploring, we discuss in this paper the issue of software security breaches resulting from embedded sleeping agents. We also investigate some patterns of embedded sleeping agents utilized in software industry. In addition, we review these patterns and propose a security model that identifies different scenarios. This security model will provide a foundation for further study on how to detect and prevent such patterns from becoming security breaches.
当软件超出其需求时——一个软件安全的视角
当前事件的证据表明,除了病毒和黑客攻击之外,许多软件系统还嵌入了构成安全威胁的“代理”,例如允许某人“侵入”安装了此类软件的计算机。当集群和云计算变得流行时,这将最终成为一个更严重的问题。由于这是一个很少有人探索的领域,我们在本文中讨论了由嵌入式休眠代理导致的软件安全漏洞问题。我们还研究了软件行业中使用的嵌入式睡眠剂的一些模式。此外,我们将回顾这些模式,并提出一个识别不同场景的安全模型。该安全模型将为进一步研究如何检测和防止此类模式成为安全漏洞提供基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信