A Framework for Deriving Verification and Validation Strategies to Assess Software Security
dc.contributor.author | Bazaz, Anil | en |
dc.contributor.committeechair | Arthur, James D. | en |
dc.contributor.department | Computer Science | en |
dc.date.accessioned | 2014-03-14T20:10:05Z | en |
dc.date.adate | 2006-04-26 | en |
dc.date.available | 2014-03-14T20:10:05Z | en |
dc.date.issued | 2006-04-14 | en |
dc.date.rdate | 2006-04-26 | en |
dc.date.sdate | 2006-04-19 | en |
dc.description.abstract | In recent years, the number of exploits targeting software applications has increased dramatically. These exploits have caused substantial economic damages. Ensuring that software applications are not vulnerable to the exploits has, therefore, become a critical requirement. The last line of defense is to test before hand if a software application is vulnerable to exploits. One can accomplish this by testing for the presence of vulnerabilities. This dissertation presents a framework for deriving verification and validation (V&V) strategies to assess the security of a software application by testing it for the presence of vulnerabilities. This framework can be used to assess the security of any software application that executes above the level of the operating system. It affords a novel approach, which consists of testing if the software application permits violation of constraints imposed by computer system resources or assumptions made about the usage of these resources. A vulnerability exists if a constraint or an assumption can be violated. Distinctively different from other approaches found in the literature, this approach simplifies the process of assessing the security of a software application. The framework is composed of three components: (1) a taxonomy of vulnerabilities, which is an informative classification of vulnerabilities, where vulnerabilities are expressed in the form of violable constraints and assumptions; (2) an object model, which is a collection of potentially vulnerable process objects that can be present in a software application; and (3) a V&V strategies component, which combines information from the taxonomy and the object model; and provides approaches for testing software applications for the presence of vulnerabilities. This dissertation also presents a step-by-step process for using the framework to assess software security. | en |
dc.description.degree | Ph. D. | en |
dc.identifier.other | etd-04192006-150313 | en |
dc.identifier.sourceurl | http://scholar.lib.vt.edu/theses/available/etd-04192006-150313/ | en |
dc.identifier.uri | http://hdl.handle.net/10919/27006 | en |
dc.publisher | Virginia Tech | en |
dc.relation.haspart | dissertation-abazaz.pdf | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | Vulnerabilities | en |
dc.subject | Verification | en |
dc.subject | Validation | en |
dc.subject | Software Security | en |
dc.subject | Constraints | en |
dc.subject | Assumptions | en |
dc.title | A Framework for Deriving Verification and Validation Strategies to Assess Software Security | en |
dc.type | Dissertation | en |
thesis.degree.discipline | Computer Science | en |
thesis.degree.grantor | Virginia Polytechnic Institute and State University | en |
thesis.degree.level | doctoral | en |
thesis.degree.name | Ph. D. | en |
Files
Original bundle
1 - 1 of 1