Browse > Article
http://dx.doi.org/10.14400/JDC.2015.13.1.257

An Analysis of the Importance among the Items in the Secure Coding used by the AHP Method  

Kim, Chi-Su (Division of Computer Engineering in Kongju University)
Publication Information
Journal of Digital Convergence / v.13, no.1, 2015 , pp. 257-262 More about this Journal
Abstract
The ministry of security and public administration provide the secure coding guide that can remove the vulnerability of applications and defend cyber attack from the coding step because cyber attack like the hacking about 75% abusing the vulnerability of applications. In this paper we find the oder of priority and did the criticality analysis used by AHP about 7 items in the secure coding which the ministry of security and public administration provide. The result is decided that 'exception handling' is the most important item. There is no secure coding items in software supervision currently, therefore the result of the research will make good use audit standards in the process of the software development.
Keywords
secure coding; AHP; android application; exception handling; Android-Java Secure Coding Guide;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Sung-Hyun Seo, Gil-Soo Jeon, The Security Threat of the Smart Phone and confrontational Strategy, no. 132, TTA(www.tta.or.kr), 2010.
2 http://www.mopas.go.kr, A guide to secure software development, Publication, MOPAS, No.11-1311000-000330-10, Retrieved May 2012.
3 Gun-Tae Jo, Young-Gon Jo, Hyun-Soo Kang, decision making using AHP, DongHyun Publishing Company, 2003
4 The ministry of security and public administration, Android-JAVA Secure Coding Guide, 2011
5 Sung-Min Lee, Comparative analysis on potential error-possibility and security vulnerability in software, Master's Thesis, Dept. of Digital Media& Information Engineering in KOREA Univ. 2010.
6 Da-Hye Jung, Secure MISRA-C, Master's Thesis, Dept. of Embedded Software in KOREA Univ. 2013.
7 Dong-Won Kim, The Study on Self Assessment of Mobile Secure Coding, Master's Thesis, Konkuk Graduate School of Information and Communications. 2011.
8 Seung-Jun Lee, A Study on the measure of efficient secure coding of the mobile app, Master's Thesis, Konkuk Graduate School of Information and Communications, 2012.
9 Jong-Chan An, A Study on Safe JSP Source Code Development Guide, Master's Thesis, Konkuk Graduate School of Information and Communications, 2012.
10 CERT, "Secure Coding", http://www.cert.org/secure-coding/, CERT Coordination Center (CERT/CC), Last updated February 18, 2010
11 Boo-Hyung Lee, A Study on Selection and Management Method of Specific IS Audit Standard Checkists Using AHP, Korean Institute od Information Technology, Vol.11 No.4, pp180-181, 2013. 4.
12 Yun-sik Son, Se-Man Oh, A Study on the Structured Weakness Classification for Mobile Applications, Journal of Korea Multimedia Society Vol. 15, No. 11, November 2012   과학기술학회마을   DOI   ScienceOn
13 Jun-Yeob Sin, A Study On Development Security Audit Methods In Mobile Service Environment, Master's Thesis, Konkuk Graduate School of Information and Communications, 2012.