{"title":"应用程序开发的安全漏洞和缓解策略","authors":"Brunil Dalila Romero Marino, Hisham M. Haddad","doi":"10.1109/ITNG.2009.151","DOIUrl":null,"url":null,"abstract":"Anticipating and mitigating security threats is critical during software development. This work investigates security vulnerabilities and mitigation strategies to help software developers build secure applications. The work examines common vulnerabilities, and relevant mitigation strategies, from several perspectives, including the input environment used to supply the software with needed data, the internal data and structures used to store and retrieve the data, the algorithms and computations performed on the data, the outputs, and the extensibility and mobile software. Examining software security from these vantage points is the key to understanding the difficulty of producing secure software applications.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Security Vulnerabilities and Mitigation Strategies for Application Development\",\"authors\":\"Brunil Dalila Romero Marino, Hisham M. Haddad\",\"doi\":\"10.1109/ITNG.2009.151\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Anticipating and mitigating security threats is critical during software development. This work investigates security vulnerabilities and mitigation strategies to help software developers build secure applications. The work examines common vulnerabilities, and relevant mitigation strategies, from several perspectives, including the input environment used to supply the software with needed data, the internal data and structures used to store and retrieve the data, the algorithms and computations performed on the data, the outputs, and the extensibility and mobile software. Examining software security from these vantage points is the key to understanding the difficulty of producing secure software applications.\",\"PeriodicalId\":347761,\"journal\":{\"name\":\"2009 Sixth International Conference on Information Technology: New Generations\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Sixth International Conference on Information Technology: New Generations\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNG.2009.151\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Sixth International Conference on Information Technology: New Generations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNG.2009.151","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Vulnerabilities and Mitigation Strategies for Application Development
Anticipating and mitigating security threats is critical during software development. This work investigates security vulnerabilities and mitigation strategies to help software developers build secure applications. The work examines common vulnerabilities, and relevant mitigation strategies, from several perspectives, including the input environment used to supply the software with needed data, the internal data and structures used to store and retrieve the data, the algorithms and computations performed on the data, the outputs, and the extensibility and mobile software. Examining software security from these vantage points is the key to understanding the difficulty of producing secure software applications.