Writing Secure Code
Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Software vulnerability analysis
Software vulnerability analysis
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Computer
IEEE Transactions on Computers
A Process for Performing Security Code Reviews
IEEE Security and Privacy
Misuse Cases: Use Cases with Hostile Intent
IEEE Software
Building security requirements using state transition diagram at security threat location
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 0.00 |
The Current attack techniques against embedded systems are used more sophisticated. Security has been the subject of intensive research in the area of embedded system. Embedded system developers should consider the security technology which protects, mitigates, and removes the vulnerabilities throughout system development life cycle. This paper is intended to introduce embedded software analyzer to challenges involved in designing secure embedded systems against buffer overflow attacks. We attempt to provide a approach specifying of embedded software security requirements in the analysis phase of SDLC. It provides to understand, analyze, and specify the security requirements at an early phase of the software development.