Abstract
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined. Software engineering methodologies do not make use of security domain knowledge in its form of vulnerability databases (e.g. CWE, CVE, Exploit DB), which are therefore not appropriate for this purpose. An approach based upon the improved use of pattern languages that encompasses security domain knowledge is proposed.
| Original language | English |
|---|---|
| Title of host publication | Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings |
| Subtitle of host publication | 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings |
| Editors | Elias Athanasopoulos, Eric Bodden, Mathias Payer |
| Publisher | Springer Verlag |
| Pages | 133-142 |
| Number of pages | 10 |
| ISBN (Electronic) | 9783319621050 |
| ISBN (Print) | 9783319621043 |
| DOIs | |
| Publication status | Published - 26 Jun 2017 |
| Event | 9th International Symposium on Engineering Secure Software and Systems 2017 - Bonn, Germany Duration: 3 Jul 2017 → 5 Jul 2017 https://downloads.distrinet-research.be/events/essos/2017/index.html |
Publication series
| Name | Lecture Notes in Computer Science: Security and Cryptology |
|---|---|
| Publisher | Springer |
| Volume | 10379 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 9th International Symposium on Engineering Secure Software and Systems 2017 |
|---|---|
| Abbreviated title | ESSoS 2017 |
| Country/Territory | Germany |
| City | Bonn |
| Period | 3/07/17 → 5/07/17 |
| Internet address |
Keywords
- Attack Pattern (AP)
- Security Pattern (SP)
- Software Development Lifecycle (SDLC)
- Software Fault Pattern (SFP)
- Vulnerability DataBase (VDB)
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fingerprint
Dive into the research topics of 'Idea-Caution Before Exploitation: The Use of Cybersecurity Domain Knowledge to Educate Software Engineers Against Software Vulnerabilities'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver