Method and Technology for Ensuring the Software Security by Identifying and Classifying the Failures and Vulnerabilities
Hovorushchenko, T., Popov, P. T. ORCID: 0000-0002-3434-5272, Medzatyi, D. & Voichur, Y. (2022). Method and Technology for Ensuring the Software Security by Identifying and Classifying the Failures and Vulnerabilities. In: Lytvynenko, I. & Lupenko, S. (Eds.), Information Technologies: Theoretical and Applied Problems 2022. 2nd International Workshop on Information Technologies: Theoretical and Applied Problems (ITTAP 2022), 22-24 Nov 2022, Ternopil, Ukraine.
Abstract
The conducted literature review on known methods and technologies for providing the software security and for identifying the failures and vulnerabilities of software showed that, although the analyzed methods and technologies have great potential for the field of software engineering, none of the known solutions are intended for identification and classification of software failures and vulnerabilities. Therefore, it is necessary to develop a method for ensuring the software security by identifying and classifying the failures and vulnerabilities, as well as to design and implement a technology for ensuring the software security by identifying and classifying the failures and vulnerabilities, which is the goal of this study. The developed in this paper method for ensuring the software security by identifying and classifying the failures and vulnerabilities provides a conclusion as to whether a failure occurred, and if a failure occurred, its type is issued to the user. In addition, the developed method for ensuring the software security by identifying and classifying the failures and vulnerabilities provides a conclusion as to whether a feature is a vulnerability, and if the feature is a vulnerability, its type is issued to the user. The paper also develops a technology for ensuring the software security by identifying and classifying the failures and vulnerabilities, which provides a conclusion on the presence or absence of software failure(s); conclusion on the presence or absence of software vulnerability(s); conclusion about the type of failure and the type of vulnerability in case of their presence, thanks to which the proposed technology is useful for software users due to the identification and classification of failures and vulnerabilities.
Publication Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | Copyright 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). |
Publisher Keywords: | Software security, failure of software, vulnerability of software, identifying the failures and vulnerabilities, classifying the failures and vulnerabilities |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Departments: | School of Science & Technology > Computer Science |
Available under License Creative Commons Attribution.
Download (1MB) | Preview
Export
Downloads
Downloads per month over past year