Advertisement

Review of Software Security Defects Taxonomy

  • Zhanwei Hui
  • Song Huang
  • Zhengping Ren
  • Yi Yao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6401)

Abstract

an organized list of actual defects can be useful for software security test (SST). In order to target their technology on a rational basis, it would be useful for security testers to have available a taxonomy of software security defects organizing the problem space. Unfortunately, the only existing suitable taxonomies are mostly for tool-builders and software designers, or based on vulnerabilities and security errors, and do not adequately represent security defects that are found in modern software. In our work, we have reviewed the traditional software security errors or vulnerabilities taxonomies. Based on analyzing in its target, motivation and insufficiency, we have compared 9 kinds of taxonomies, which would be useful for defects based software security testing.

Keywords

software security defect vulnerability error security test taxonomy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    McGraw, G.: Software Security. IEEE Security & Privacy 2(2), 80–83 (2004)CrossRefGoogle Scholar
  2. 2.
    Potter, B., McGraw, G.: Software security testing. Security and Privacy Magazine IEEE 2(5), 81–85 (2004)CrossRefGoogle Scholar
  3. 3.
    Leveson, N., Turner, C.S.: An investigation of the Therac-25 accidents. UCI TR 92-108. Inf. and Comp. Sci. Dept., Univ. of Cal.-Irvine, Irvine, CA (1992)Google Scholar
  4. 4.
    Spafford, E.H.: Crisis and aftermath. Comm. ACM 32, 678–687 (1989)CrossRefGoogle Scholar
  5. 5.
    Brehmer, C.L., Carl, J.R.: Incorporating IEEE Standard 1044 into your anomaly tracking process. CrossTalk. J. Defense Software Engineering 6, 9–16 (1993); Chillarege, R.Google Scholar
  6. 6.
    Bhandari, I.S., Chaar, J.K., Halliday, M.J., Moebus, D.S., Ray, B.K., Wong, M.-Y.: Orthogonal defect classification—a concept for in-process measurements. IEEE Trans. on Software Engineering 18(11), 943–956 (1992)CrossRefGoogle Scholar
  7. 7.
    IEEE Computer Society 1990. Standard glossary of software engineering terminology. ANSI/IEEE Standard 610.12-1990. IEEE Press, New York (1990)Google Scholar
  8. 8.
    Landwehr, C.E.: Dependability: Basic Concepts and Terminology. Dependable Computing and Fault-Tolerant Systems, vol. 6. Springer, New York (1992)Google Scholar
  9. 9.
    Davis, N., Humphrey, W., Zibulski, G., Mcgraw, G.: Processes for producing secure software. IEEE Security& Privacy (2004)Google Scholar
  10. 10.
  11. 11.
    Landwehr, C.E.: Formal models for computer security. ACM Computing Surveys 13(3), 247–278 (1981)CrossRefGoogle Scholar
  12. 12.
    Linde, R.R.: Operating system penetration. In: AFIPS National Computer Conference, pp. 361–368 (1975)Google Scholar
  13. 13.
    Bishop, M., Bailey, D.: A critical analysis of vulnerability taxonomies. Technical Report CSE-96-11, Department of Computer Science at the University of California at Davis (September 1996)Google Scholar
  14. 14.
    Anderson, J.P.: Computer security technology planning study. Technical Report ESD–TR–73–51, Vols. I, II, James P. Anderson and Co., Fort Washington, PA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA (October 1972)Google Scholar
  15. 15.
    Lindquist, U., Jonsson, E.: How to systematically classify computer security intrusions. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 154–163 (1997)Google Scholar
  16. 16.
    Howard, J.D.: An Analysis of Security Incidents on the Internet 1989 - 1995. PhD thesis, Carnegie Mellon University (April 1997)Google Scholar
  17. 17.
    Wysopal, C., Nelson, L., Zovi, D.D., Dustin, E.: The Art of Software Security Testing. Symatec pressGoogle Scholar
  18. 18.
    Aslam, T., Krsul, I., Spafford, E.H.: Use of a taxonomy of security faults. In: Proc. 19th NIST-NCSC National Information Systems Security Conference, pp. 551–560 (1996)Google Scholar
  19. 19.
    Abbott, R.P., Chin, J.S., Donnelley, J.E., Konigsford, W.L., Tukubo, S., Webb, D.A.: Security analysis and enhancements of computer operating systems. NBSIR 76-1041, The RISOS Project, Lawrence Livermore Laboratory, Livermore, CA, USA (April 1976)Google Scholar
  20. 20.
    Bisbey, R., Hollingworth, D.: Protection analysis: Final report. Technical Report ISI/SR-78-13, Information Sciences Institute, University of Southern California, Marina del Rey, CA (May 1978)Google Scholar
  21. 21.
    Aslam, T.: A taxonomy of security faults in the UNIX operating system. Master’s thesis, Purdue University (August 1995)Google Scholar
  22. 22.
    Bisbey, R.:Private communication (July 26, 1990) Google Scholar
  23. 23.
    Weber, S., Karger, P.A., Paradkar, A.: A Software Flaw Taxonomy: Aiming Tools At Security. In: Software Engineering for Secure Systems – Building Trustworthy Applications (SESS 2005), St. Louis, Missouri, USA (2005)Google Scholar
  24. 24.
    Landwehr, C.E., Bull, A.R., McDermott, J.P., Choi, W.S.: A taxonomy of computer program security flaws. ACM Computer Surveys 26(3), 211–254 (1994)CrossRefGoogle Scholar
  25. 25.
    Ashcraft, K., Engler, D.: Using programmer-written compiler extensions to catch security holes. In: IEEE Symposium on Security and Privacy, Oakland, California (May 2002)Google Scholar
  26. 26.
    Weber, S., Karger, P.A., Paradkar, A.: A Software Flaw Taxonomy: Aiming Tools At Security. In: Software Engineering for Secure Systems – Building Trustworthy Applications (SESS 2005), St. Louis, Missouri, USA (2005)Google Scholar
  27. 27.
    Hui, Z.: Research on the techniques of software security testing based on software security defects. Master thesis. PLA University of Science and Technology (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Zhanwei Hui
    • 1
  • Song Huang
    • 1
  • Zhengping Ren
    • 1
  • Yi Yao
    • 1
  1. 1.PLA Software Test and Evaluation Centre for Military TrainingPLA University of Science and TechnologyNanjingPRC

Personalised recommendations