Authors
Wentao Wang, Faryn Dumont, Nan Niu, Glen Horton
Publication date
2020/10/13
Journal
IEEE Transactions on Software Engineering
Publisher
IEEE
Description
Cyber attacks targeting software applications have a tremendous impact on our daily life. For example, attackers have utilized vulnerabilities of web applications to steal and gain unauthorized use of sensitive data stored in these systems. Previous studies indicate that security testing is highly precise, and therefore is widely applied to validate individual security requirements. However, dependencies between security requirements may cause additional vulnerabilities. Manual dependency detection faces scalability challenges, e.g., a previous study shows that the pairwise dependency analysis of 40 requirements would take around 12 hours. In this article, we present a novel approach which integrates the interdependency among high-level security requirements, such as those documented in policies, regulations, and standards. We then use automated requirements tracing methods to identify product-level security …
Total citations
202120222023202498810
Scholar articles
W Wang, F Dumont, N Niu, G Horton - IEEE Transactions on Software Engineering, 2020