Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.2.243

Nuclear-related Software analysis based on secure coding  

Jung, Da-Hye (Korea university)
Choi, Jin-Young (Korea university)
Lee, Song-Hee (Korea university)
Abstract
We have entered into an era of smart software system where the many kinds of embedded software, especially SCADA and Automotive software not only require high reliability and safety but also high-security. Removing software weakness during the software development lifecycle is very important because hackers exploit weaknesses which are source of software vulnerabilities when attacking a system. Therefore the coding rule as like core functions of MISRA-C should expand their coding focus on security. In this paper, we used CERT-C secure coding rules for nuclear-related software being developed to demonstrate high-safety software, and proposed how to remove software weakness during development.
Keywords
embedded software; SCADA; software vulnerabilities; software weakness; secure coding;
Citations & Related Records
연도 인용수 순위
  • Reference
1 NIST, "The Economic Impacts of Inadequate Infrastructure for Software Testing," May. 2002.
2 행정안전부 http://www.mopas.go.kr
3 NIST(National Institute of Standards and Technology) http://csrc.nist.gov
4 로버트 C, 현동성 역. 시코드 저,"버그 없는 안전한 소프트웨어를 위한 CERT C 프로그래밍," 에이콘, pp.26, 2010
5 Joint Strike Fighter http://www.jsf.mil
6 Common Weakness Enumeration, "2011 CWE/SANS Top 25 Most Dangerous Software Errors," http://cwe.mitre.org/ top25/ Sep 13 2011.
7 Herbert Schildt 저, 유해영/우진운 역, "알기 쉽게 해설한 C" Second Edition, 이한 출판사, p150, July 30, 2003.
8 Common Vulnerabilities and Exposures http://cve.mitre.org
9 Gartner http://gartner.com Nov. 2005.
10 Nicolas Falliere, Liam O Murchu, Eric Chien, "W32.Stuxnet Dossier version 1.0," Symantec, September. 2010.
11 A. John, R. Peter, "Electric Communication Development," Communications of the ACM, 40, pp. 71-79, May. 1997.