• Title/Summary/Keyword: Software security

Search Result 1,555, Processing Time 0.023 seconds

The Role of Open Source Software to Create Digital Libraries and Standards Assessment

  • ALbeladi, Salmah Salem
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.241-248
    • /
    • 2021
  • Open-source software developments are basically Internet-based communities that voluntarily collaborate in developing software on the Internet and such Internet communities have become an important cultural and economic phenomenon. As a result, the emergence of open-source software has presented a challenge to the traditional offerings by providing free alternatives. The objective of this article is to review the possibility of the adoption of open source software in the creation of digital libraries, highlights advantages and disadvantage preservations. Among our objective also explaining the request of such software at the present time and the criteria evaluated in the digital preservation through surveying the best open source software from the reality of intellectual production, and standards that are being built to evaluate and choose what software to create a digital library without other software available. To achieve the above objectives, we shed the light on the top 11 open-source software to manage Libraries in addition to standards that may represent the basic building block for the selection of the appropriate systems to the needs of the digital library. This article relied on the descriptive approach by reviewing a series of studies and scientific research works related to the subject of the current study. Accordingly, the most prominent of the findings of this work is its illustration of the close association between open source software and the library community, both of which represent free culture. Also it is shown that the selection process of open source software has some obstacles most notably as there are no clear and reliable criteria for selecting these systems. Current study has concluded a set of recommendations, notably awareness of the role and importance of open source software and the facilities it provides in managing digital content.

A Study on Memory Hacking Prevention System in Windows Environment (윈도우 환경에서의 메모리 해킹 방지 시스템 연구)

  • Kim, Yo-Sik;Yun, Young-Tae;Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.75-86
    • /
    • 2005
  • Recently, illegal manipulation and forgery threats on computer softwares are increasing due to the advances in reverse engineering techniques. Furthermore someone who has concerns about these area can crack the software by using the open-to-public simple tools on the internet. The software companies are struggling to defend their own softwares against threats, while the crackers are continuing to crack the softwares. In this paper, we first establish the generic software threat model and, analyze and experiment on the software cracks, before suggest a memory hacking prevention system in Microsoft Windows environment.

  • PDF

The Status Quo and Future of Software Regression Bug Discovery via Fuzz Testing (퍼즈 테스팅을 통한 소프트웨어 회귀 버그 탐색 기법의 동향과 전망)

  • Lee, Gwangmu;Lee, Byoungyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.911-917
    • /
    • 2021
  • As software gets an increasing amount of patches, lots of software bugs are increasingly caused by such software patches, collectively known as regression bugs. To proactively detect the regressions bugs, both industry and academia are actively searching for a way to augment fuzz testing, one of the most popular automatic bug detection techniques. In this paper, we investigate the status quo of the studies on augmenting fuzz testing for regression bug detection and, based on the limitations of current proposals, provide an outlook of the relevant research.

A Novel Approach For Component Classifications And Adaptation Using JALTREE Algorithm

  • Jalender, B.;Govardhan, Dr. A
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.115-122
    • /
    • 2022
  • Component adaptation is widely recognized as one of the main problems of the components, used in component based software engineering (CBSE). We developed methods to adjust the components classified by the keywords. Three main methods are discussed in this article those methods are combined with several domain component interfaces, high level simple notation for the adapter design patterns. The automated process for classifying high-level components are using adaptation is novel to software engineering domain. All Specifications and many technologies for re-using software, CBD and further developments have been emerged in recent years. The effects of these technologies on program quality or software costs must be analyzed. The risk concerns a single technology and must identify its combinations. In this paper, we are going to discuss the methods to adapt components of different technologies

A Study on Encryption Algorithm for Sensitive Data Security in Cloud Storage (클라우드 저장소에 민감 데이터 보안 강화를 위한 암호화 알고리즘 연구)

  • Joo, Hyung-Jin;Kim, Dae-hun;Choi, Sang-hyun;Min, Youn-A;Baek, Yeong-tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.195-196
    • /
    • 2020
  • 본 논문에서는 클라우드 저장소의 민감한 데이터를 보호하기 위해 제시된 암호화 알고리즘을 이용하여 텍스트 데이터를 암호화하고 처리 속도에 대한 성능을 측정하여 기존의 방식과 비교·분석하였다. 클라우드 데이터는 사용자 로그인 정보 탈취나 SSL Strip 공격에 취약하기 때문에 이러한 보안 사고의 피해를 최소화하기 위해 데이터 암호화를 통한 데이터의 보안이 요구된다. 본 논문에서는 클라우드 전송을 위해 구글 드라이브 API를 연동했으며, 암호화 알고리즘을 텍스트에 적용하기 위해 Python 언어를 이용하여 데이터를 암호화하고 구글 드라이브에 전송하는 테스트 프로그램을 제작하여 프로젝트를 진행하였다.

  • PDF

Hints-based Approach for UML Class Diagrams

  • Sehrish Abrejo;Amber Baig;Adnan Asghar Ali;Mutee U Rahman;Aqsa Khoso
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.9-15
    • /
    • 2023
  • A common language for modeling software requirements and design in recent years is Unified Modeling Language (UML). Essential principles and rules are provided by UML to help visualize and comprehend complex software systems. It has therefore been incorporated into the curriculum for software engineering courses at several institutions all around the world. However, it is commonly recognized that UML is challenging for beginners to understand, mostly owing to its complexity and ill-defined nature. It is unavoidable that we need to comprehend their preferences and issues considerably better than we do presently to approach the problem of teaching UML to beginner students in an acceptable manner. This paper offers a hint-based approach that can be implemented along with an ordinary lab task. Some keywords are highlighted to indicate class diagram components and make students understand the textual descriptions. The experimental results indicate significant improvement in students' learning skills. Furthermore, the majority of students also positively responded to the survey conducted in the end experimental study.

Efficiency of Graph for the Remodularization of Multi-Level Software Architectures

  • Lala Madiha HAKIK
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.33-39
    • /
    • 2024
  • In a previous study we proceeded to the remodularization architecture based on classes and packages using the Formal Concept Analysis (FCA)[13] [14] [30]. we then got two possible remodularized architectures and we explored the issue of redistributing classes of a package to other packages, we used an approach based on Oriented Graph to determine the packages that receive the redistributed classes and we evaluated the quality of a remodularized software architecture by metrics [31] [28] [29]. In this paper, we will address the issue of the efficiency of the Oriented Graph in the remodularization of software architectures compared to the Formal Concept Analysis FCA method. The formal method of FCA concept is not popularized among scientists as opposed to the use of the labeled directed graph. It is for this reason that our directed graph approach is more effective in its simplicity and popularity.

Hints based Approach for UML Class Diagrams

  • Sehrish Abrejo;Amber Baig;Adnan Asghar Ali;Mutee U Rahman;Aqsa Khoso
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.180-186
    • /
    • 2024
  • A common language for modelling software requirements and design in recent years is Unified Modeling Language (UML). Essential principles and rules are provided by UML to help visualize and comprehend complex software systems. It has therefore been incorporated into the curriculum for software engineering courses at several institutions all around the world. However, it is commonly recognized that UML is challenging for beginners to understand, mostly owing to its complexity and ill-defined nature. It is unavoidable that we need to comprehend their preferences and issues considerably better than we do presently in order to approach the problem of teaching UML to beginner students in an acceptable manner. This paper offers a hint based approach that can be implemented along with an ordinary lab task. Some keywords are heighted to indicate class diagram component and make students to understand the textual descriptions. The experimental results indicate significant improvement in students learning skills. Furthermore, majority of students also positively responded to the survey conducted in the end experimental study.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.