Atjaunināt sīkdatņu piekrišanu

E-grāmata: Empirical Research for Software Security: Foundations and Experience

Edited by (SINTEF ICT, Trondheim, Norway), Edited by (SBA Research, Vienna, Austria), Edited by (Fraunhofer Secure Information Technology; and Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany)
  • Formāts - PDF+DRM
  • Cena: 56,34 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

Preface ix
List of Figures
xiii
List of Tables
xv
Contributors xix
1 Empirical Research on Security and Privacy by Design
1(46)
Koen Yskout
Kim Wuyts
Dimitri Van Landuyt
Riccardo Scandariato
Wouter Joosen
1.1 Introduction
2(3)
1.2 Empirical Research on Security and Privacy by Design
5(4)
1.3 Scoping
9(3)
1.4 Planning
12(18)
1.5 Operation
30(5)
1.6 Analysis and Interpretation
35(6)
1.7 Presentation and Packaging
41(2)
1.8 Conclusion
43(4)
2 Guidelines for Systematic Mapping Studies in Security Engineering
47(22)
Michael Felderer
Jeffrey C. Carver
2.1 Introduction
48(1)
2.2 Background on Systematic Mapping Studies in Software Engineering
49(6)
2.3 Overview of Available Mapping Studies in Security Engineering
55(2)
2.4 Guidelines for Systematic Mapping Studies in Security Engineering
57(8)
2.5 Summary
65(4)
3 An Introduction to Data Analytics for Software Security
69(26)
Lotfiben Othmane
Achim D. Brucker
Stanislav Dashevskyi
Peter Tsalovski
3.1 Introduction
70(1)
3.2 Secure Software Development
71(3)
3.3 Software Security Analytical Process
74(8)
3.4 Learning Methods Used in Software Security
82(4)
3.5 Evaluation of Model Performance
86(3)
3.6 More Lessons Learned
89(1)
3.7 Conclusion
89(1)
3.8 Acknowledgment
90(5)
4 Generating Software Security Knowledge Through Empirical Methods
95(44)
Rene Noel
Santiago Matalonga
Gilberto Pedraza
Hernan Astudillo
Eduardo B. Fernandez
4.1 Introduction and Motivation
96(1)
4.2 Empirical Methods for Knowledge Generation
97(2)
4.3 Example Application Domain: Secure Software Development Research Project
99(1)
4.4 Experiments
100(12)
4.5 Systematic Literature Mappings
112(10)
4.6 Case Studies
122(6)
4.7 Experimental Replications
128(4)
4.8 Conclusions
132(2)
4.9 Acknowledgment
134(5)
5 Visual Analytics: Foundations and Experiences in Malware Analysis
139(34)
Markus Wagner
Dominik Sacha
Alexander Rind
Fabian Fischer
Robert Luh
Sebastian Schrittwieser
Daniel A. Keim
Wolfgang Aigner
5.1 Introduction
140(1)
5.2 Background in Malware Analysis
140(3)
5.3 Visual Analytics Foundations
143(7)
5.4 The Knowledge Generation Process
150(2)
5.5 Design and Evaluation for Visual Analytics Systems
152(2)
5.6 Experience in Malware Analysis
154(7)
5.7 Future Directions
161(3)
5.8 Conclusions
164(9)
6 Analysis of Metrics for Classification Accuracy in Intrusion Detection
173(28)
Natalia Stakhanova
Alvaro A. Cardenas
6.1 Introduction
174(1)
6.2 Evaluation Metrics
175(10)
6.3 Literature Review
185(6)
6.4 What Hinders Adoption of Alternative Metrics
191(3)
6.5 Guidelines for Introducing New Evaluation Metrics
194(1)
6.6 Conclusions
195(1)
6.7 Acknowledgement
196(5)
7 The Building Security in Maturity Model as a Research Tool
201(8)
Martin Gilje Jaatun
7.1 Introduction
201(1)
7.2 Background
202(1)
7.3 Questionnaires in Software Security
202(2)
7.4 A Case Study
204(1)
7.5 Discussion
205(2)
7.6 Conclusion
207(2)
8 Agile Test Automation for Web Applications --- A Security Perspective
209(40)
Sandra Domenique Ringmann
Hanno Langweg
8.1 Introduction
210(1)
8.2 Methodology
211(1)
8.3 Risk Assessment
212(5)
8.4 Testing and Test Automation from the Security Perspective
217(5)
8.5 Static Analysis Tools
222(7)
8.6 Dynamic Analysis Tools and Frameworks
229(9)
8.7 Evaluating Static/Dynamic Analysis Tools and Frameworks
238(1)
8.8 Appraisal of the Tools
239(1)
8.9 Conclusion
240(9)
9 Benchmark for Empirical Evaluation of Web Application Anomaly Detectors
249(26)
Robert Bronte
Hossain Shahriar
Hisham Haddad
9.1 Introduction
250(1)
9.2 Literature Review
251(5)
9.3 Benchmark Characteristics for Application-Layer Attack Detection Approaches
256(5)
9.4 An Example Environment for Generating Benchmark Data
261(4)
9.5 Using the Benchmark Dataset to Evaluate an IDS
265(6)
9.6 Conclusion
271(4)
10 Threats to Validity in Empirical Software Security Research
275(26)
Daniela S. Cruzes
Lotfiben Othmane
10.1 Introduction
276(1)
10.2 Denning Validity
277(1)
10.3 Validity for Quantitative Research
278(11)
10.4 Threats to Validity for Qualitative Research
289(8)
10.5 Summary and Conclusions
297(4)
Index 301
Dr. Lotfi ben Othmane is on the faculty at the Department of Electrical and Computer Engineering, Iowa State University, USA. Previously, he was a Research Scientist and then Head of the Secure Software Engineering department at Fraunhofer SIT, Germany. Lotfi received his Ph.D. from Western Michigan University (WMU), USA, in 2010; the M.S. in computer science from University of Sherbrooke, Canada, in 2000; and the B.S in information systems from University of Sfax, Tunisia, in 1995. He works currently on software security, specifically on (1) the application of empirical methods to address software security challenges and (2) the impact of incremental development on the security of software.

Dr. Martin Gilje Jaatun is a Senior Scientist at SINTEF ICT, where he has been employed since 2004. He received his Sivilingeniųr degree in Telematics from the Norwegian Institute of Technology (NTH) in 1992, and the Dr.Philos. degree from the University of Stavanger in 2015. Previous positions include scientist at the Norwegian Defence Research Establishment (FFI), and Senior Lecturer in information security at the Bodų Graduate School of Business. His research interests include software security, security in cloud computing, and security of critical information infrastructures. Dr. Jaatun is an associate editor of the International Journal of Secure Software engineering. He is vice chairman of the Cloud Computing Association (cloudcom.org), vice chairman of Cloud Security Alliance Norway, and a Senior Member of the IEEE.



Dr. Edgar Weippl is Research Director of SBA Research and Associate Professor at the Vienna University of Technology. His research focuses on applied concepts of IT security. He has published numerous articles in journals and more than 100 papers in peer-reviewed conferences. After graduating with a Ph.D. from the Vienna University of Technology, he worked in a research startup for two years. He then spent one year teaching as an assistant professor at Beloit College, WI. From 2002 to 2004, he was a Consultant for a Health Maintenance Organization (HMO) in New York and Albany, NY, and for Deutsche Bank, Frankfurt, Germany. In 2004 he joined the Vienna University of Technology and co-founded SBA Research. Dr. Weippl has edited a large number of special issues in journals such as Information Security Technical Report and Computers & Security.