{"title":"软件开发中的安全编码","authors":"Nor Harisah Zainuddin Zenah, N. A. Aziz","doi":"10.1109/MYSEC.2011.6140716","DOIUrl":null,"url":null,"abstract":"The demand of secure computing systems and its platform is crucial in today's networked and computing world. As the number of illegitimate users and applications increased, the systems vulnerabilities can be a treat to individuals and organizations. This paper highlights software vulnerabilities and approaches to address them. In addition to such awareness that has been going on for the past decade, this research proposed a tool that can increase engineer's skills and knowledge towards secure software in building secure system. This proposed tool will be discussed about the software vulnerabilities and present these vulnerabilities in the form of exercises, questions, queries, and solution for the users including some examples for every vulnerability in order to give more clearer understanding to the users.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Secure coding in software development\",\"authors\":\"Nor Harisah Zainuddin Zenah, N. A. Aziz\",\"doi\":\"10.1109/MYSEC.2011.6140716\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The demand of secure computing systems and its platform is crucial in today's networked and computing world. As the number of illegitimate users and applications increased, the systems vulnerabilities can be a treat to individuals and organizations. This paper highlights software vulnerabilities and approaches to address them. In addition to such awareness that has been going on for the past decade, this research proposed a tool that can increase engineer's skills and knowledge towards secure software in building secure system. This proposed tool will be discussed about the software vulnerabilities and present these vulnerabilities in the form of exercises, questions, queries, and solution for the users including some examples for every vulnerability in order to give more clearer understanding to the users.\",\"PeriodicalId\":137714,\"journal\":{\"name\":\"2011 Malaysian Conference in Software Engineering\",\"volume\":\"101 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Malaysian Conference in Software Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MYSEC.2011.6140716\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Malaysian Conference in Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MYSEC.2011.6140716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The demand of secure computing systems and its platform is crucial in today's networked and computing world. As the number of illegitimate users and applications increased, the systems vulnerabilities can be a treat to individuals and organizations. This paper highlights software vulnerabilities and approaches to address them. In addition to such awareness that has been going on for the past decade, this research proposed a tool that can increase engineer's skills and knowledge towards secure software in building secure system. This proposed tool will be discussed about the software vulnerabilities and present these vulnerabilities in the form of exercises, questions, queries, and solution for the users including some examples for every vulnerability in order to give more clearer understanding to the users.