Software Security Validation through Regular Expressions

In modern society, software security has become an essential part of most software systems. As nowadays, new systems roll out more than ever, cybercriminals and unethical hackers tend to target those new systems to abuse and exploit its vulnerability to achieve a specific goal regardless of the consequences. Thus, validating software security is a challenging task and of crucial importance. The paper aims to find an optimal logical approach to test and validate software security through static analysis using regular expressions to optimize and secure the source code of the software.

[1]  Apostolos Ampatzoglou,et al.  Interrelations between Software Quality Metrics, Performance and Energy Consumption in Embedded Applications , 2018, SCOPES.

[2]  Mustafa Hammad,et al.  Validating Software Security using Regular Expressions , 2019, 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT).

[3]  Gu Tian-yang,et al.  Research on Software Security Testing , 2010 .

[4]  D. T. Lee,et al.  Securing web application code by static analysis and runtime protection , 2004, WWW '04.

[5]  Pankaj Mudholkar,et al.  Software Testing , 2002, Computer.

[6]  P. Santhi Thilagam,et al.  Securing web applications from injection and logic vulnerabilities: Approaches and challenges , 2016, Inf. Softw. Technol..

[7]  Malcolm Robert Pattinson,et al.  Individual differences and Information Security Awareness , 2017, Comput. Hum. Behav..

[8]  Jan Goyvaerts,et al.  Regular Expressions Cookbook - Detailed Solutions in Eight Programming Languages, Second Edition , 2009 .

[9]  Lars Backman Why is security still an issue? : A study comparing developers’ software security awareness to existing vulnerabilities in software applications , 2018 .

[10]  John C. Kelly,et al.  Development of a software security assessment instrument to reduce software security risk , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.

[11]  Jörg Henkel,et al.  Dependable embedded systems , 2015, it Inf. Technol..

[12]  Jianmin Wang,et al.  Improving software security awareness using a serious game , 2019, IET Softw..

[13]  Mustafa Hammad,et al.  Securing Systems and Software: Current State and Challenges , 2019, 2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO).

[14]  Jason R. C. Nurse,et al.  Cyber Security Awareness Campaigns: Why do they fail to change behaviour? , 2014, ArXiv.

[15]  Rajeev Kumar,et al.  Revisiting Software Security: Durability Perspective , 2015 .

[16]  Refractor Vision , 2000, The Lancet.

[17]  Yves Roudier,et al.  Static Code Analysis for Software Security Verification: Problems and Approaches , 2014, 2014 IEEE 38th International Computer Software and Applications Conference Workshops.

[18]  Gary McGraw,et al.  Software Penetration Testing , 2005, IEEE Secur. Priv..

[19]  Gary McGraw,et al.  Software Security Testing , 2004, IEEE Secur. Priv..