Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model

Regardless that the classic buffer overflow is a known and simple threat against software systems; security agencies still consider this threat as one of the most common software vulnerabilities. Aiming to increasing security resistance against this software threat, emphasize on software design phas...

Full description

Saved in:
Bibliographic Details
Main Authors: Kama, Mohd. Nazri, Hedayatpour, Saman
Format: Article
Published: Science and Engineering Research Support Society 2014
Subjects:
Online Access:http://eprints.utm.my/id/eprint/63110/
http://dx.doi.org/10.14257/ijseia.2014.8.8,16
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.63110
record_format eprints
spelling my.utm.631102017-06-15T01:36:02Z http://eprints.utm.my/id/eprint/63110/ Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model Kama, Mohd. Nazri Hedayatpour, Saman QA75 Electronic computers. Computer science Regardless that the classic buffer overflow is a known and simple threat against software systems; security agencies still consider this threat as one of the most common software vulnerabilities. Aiming to increasing security resistance against this software threat, emphasize on software design phase is highly reasonable where cost and time required for fixing error in design level is several times lesser than coding or implementation levels. In this purpose, we use the Attack-based security analysis model for tracking and mitigating the classic buffer overflow during the software design phase. Through this model, we use known properties and behaviors of the buffer overflow to determine system vulnerabilities and address required security aspects. In this paper, we describe how to apply the Attack-based security analysis model for increasing security resistance against the classic buffer overflow. The main contribution of this work refers to showing capability of the Attack-based security analysis model in tracking and mitigating the classic buffer overflow into the software design phase in such a way that additional cost and time are not required for system analyzing and defining threat scenario. Science and Engineering Research Support Society 2014 Article PeerReviewed Kama, Mohd. Nazri and Hedayatpour, Saman (2014) Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model. International Journal of Software Engineering and its Applications, 8 (8). pp. 171-180. ISSN 1738-9984 http://dx.doi.org/10.14257/ijseia.2014.8.8,16 DOI:10.14257/ijseia.2014.8.8,16
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Kama, Mohd. Nazri
Hedayatpour, Saman
Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model
description Regardless that the classic buffer overflow is a known and simple threat against software systems; security agencies still consider this threat as one of the most common software vulnerabilities. Aiming to increasing security resistance against this software threat, emphasize on software design phase is highly reasonable where cost and time required for fixing error in design level is several times lesser than coding or implementation levels. In this purpose, we use the Attack-based security analysis model for tracking and mitigating the classic buffer overflow during the software design phase. Through this model, we use known properties and behaviors of the buffer overflow to determine system vulnerabilities and address required security aspects. In this paper, we describe how to apply the Attack-based security analysis model for increasing security resistance against the classic buffer overflow. The main contribution of this work refers to showing capability of the Attack-based security analysis model in tracking and mitigating the classic buffer overflow into the software design phase in such a way that additional cost and time are not required for system analyzing and defining threat scenario.
format Article
author Kama, Mohd. Nazri
Hedayatpour, Saman
author_facet Kama, Mohd. Nazri
Hedayatpour, Saman
author_sort Kama, Mohd. Nazri
title Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model
title_short Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model
title_full Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model
title_fullStr Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model
title_full_unstemmed Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model
title_sort tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model
publisher Science and Engineering Research Support Society
publishDate 2014
url http://eprints.utm.my/id/eprint/63110/
http://dx.doi.org/10.14257/ijseia.2014.8.8,16
_version_ 1643655621505974272
score 13.15806