• DocumentCode
    710249
  • Title

    A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories

  • Author

    Nadeem, Muhammad ; Allen, Edward B. ; Williams, Byron J.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Mississippi State Univ., Starkville, MS, USA
  • fYear
    2015
  • fDate
    13-15 April 2015
  • Firstpage
    534
  • Lastpage
    539
  • Abstract
    Security breaches in software systems are often caused by vulnerable code, which result in loss of confidential data in addition to reputation and financial damages. To achieve robust software security, developers must be given proper training on secure coding practices. Conventional training methods are limited as they do not take the prior code written by the developers into account. We propose a Computer Security Training Recommender to help identify focused and narrow training areas for software developers. The proposed system leverages the power of public vulnerability repositories, static analysis techniques, and mapping algorithms. The public vulnerability repositories, hosting community accepted solutions to several security problems, serve as the knowledgebase for the proposed system. We use static analysis techniques to uncover vulnerabilities present in developers´ code. Finally, the mapping algorithms use information about flagged vulnerabilities to retrieve the most relevant articles from the knowledgebase. Hence, the mitigation strategies given in the articles can be used as a resource to train the individual developers. This paper presents an architecture of the proposed recommender system and a proof-of-concept case study. Preliminary empirical evaluation indicates that the proposed system is promising.
  • Keywords
    financial data processing; recommender systems; security of data; software engineering; computer security training recommender; confidential data; financial damages; mapping algorithms; public vulnerability repositories; recommending computer-security training; robust software security; secure coding practices; security breaches; software developers; software systems; static analysis techniques; vulnerable code; Computer architecture; Databases; Prototypes; Recommender systems; Security; Software; Training; FindBugs; Recommender system; public vulnerability repository; security; software vulnerabilities; static analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology - New Generations (ITNG), 2015 12th International Conference on
  • Conference_Location
    Las Vegas, NV
  • Print_ISBN
    978-1-4799-8827-3
  • Type

    conf

  • DOI
    10.1109/ITNG.2015.90
  • Filename
    7113528