Evolution of security engineering artifacts: a state of the art survey

M Felderer, B Katt, P Kalb, J Jürjens… - Transportation …, 2015 - igi-global.com
Security is an important quality aspect of modern open software systems. However, it is
challenging to keep such systems secure because of evolution. Security evolution can only …

Deldroid: an automated approach for determination and enforcement of least-privilege architecture in android

M Hammad, H Bagheri, S Malek - Journal of Systems and Software, 2019 - Elsevier
Android is widely used for the development and deployment of autonomous and smart
systems, including software targeted for IoT and mobile devices. Security of such systems is …

Self-protection of android systems from inter-component communication attacks

M Hammad, J Garcia, S Malek - Proceedings of the 33rd ACM/IEEE …, 2018 - dl.acm.org
The current security mechanisms for Android apps, both static and dynamic analysis
approaches, are insufficient for detection and prevention of the increasingly dynamic and …

Determination and enforcement of least-privilege architecture in android

M Hammad, H Bagheri, S Malek - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Modern mobile platforms rely on a permission model to guard the system's resources and
apps. In Android, since the permissions are granted at the granularity of apps, and all …

Making least privilege the low-hanging fruit in clouds

T Puyang, Q Shen, Y Luo, W Luo… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Failing to promote the least privilege principle in administration can lead to substantial
vulnerabilities in cloud computing. A malicious insider like a compromised cloud …

Composition of least privilege analysis results in software architectures (position paper)

K Buyens, R Scandariato, W Joosen - Proceedings of the 7th …, 2011 - dl.acm.org
Security principles are often neglected by software architects, due to the lack of precise
definitions. This results in potentially high-risk threats to systems. Our own previous work …

Towards Least Privilege Principle: Limiting Unintended Accesses in Software Systems.

BH Ng - 2013 - deepblue.lib.umich.edu
Adhering to the least privilege principle involves ensuring that only legitimate subjects have
access rights to objects. Sometimes, this is hard because of permission irrevocability …

[PDF][PDF] Connecting Security Requirements and Software Architecture with Patterns (Beveiligingsvereisten en softwarearchitectuur verbinden met patronen)

K Yskout - 2013 - lirias.kuleuven.be
Recurring solutions to software engineering problems are often captured in patterns, which
describe, in a generic but reusable manner, a specific problem and a corresponding …

Extraction of an Architectural Model for Least Privilege Analysis

B Spitz, R Scandariato, W Joosen - International Journal of Secure …, 2012 - igi-global.com
This paper presents the design and implementation of a prototype tool for the extraction of
the so-called Task Execution Model directly from the source code of a software system. The …