A Novel Approach to Identify Security Controls in Source Code

07/10/2023
by   Ahmet Okutan, et al.
0

Secure by Design has become the mainstream development approach ensuring that software systems are not vulnerable to cyberattacks. Architectural security controls need to be carefully monitored over the software development life cycle to avoid critical design flaws. Unfortunately, functional requirements usually get in the way of the security features, and the development team may not correctly address critical security requirements. Identifying tactic-related code pieces in a software project enables an efficient review of the security controls' implementation as well as a resilient software architecture. This paper enumerates a comprehensive list of commonly used security controls and creates a dataset for each one of them by pulling related and unrelated code snippets from the open API of the StackOverflow question and answer platform. It uses the state-of-the-art NLP technique Bidirectional Encoder Representations from Transformers (BERT) and the Tactic Detector from our prior work to show that code pieces that implement security controls could be identified with high confidence. The results show that our model trained on tactic-related and unrelated code snippets derived from StackOverflow is able to identify tactic-related code pieces with F-Measure values above 0.9.

READ FULL TEXT

page 6

page 9

page 10

research
01/04/2023

Identifying Personal Data Processing for Code Review

Code review is a critical step in the software development life cycle, w...
research
03/09/2022

COMMAND: Certifiable Open Measurable Mandates

Security mandates today are often in the form of checklists and are gene...
research
10/03/2019

A Critical View on CIS Controls

CIS Controls is a set of 20 controls and 171 sub-controls that were crea...
research
08/25/2021

AppSecure.nrw Software Security Study

In recent years, the World Economic Forum has identified software securi...
research
02/08/2021

Moderator Factors of Software Security and Performance Verification

Context: Security and performance (S P) are critical non-functional re...
research
08/01/2019

Learning to Identify Security-Related Issues Using Convolutional Neural Networks

Software security is becoming a high priority for both large companies a...
research
08/01/2019

Learning to Identify Security-RelatedIssues Using Convolutional Neural Networks

Software security is becoming a high priority for both large companies a...

Please sign up or login with your details

Forgot password? Click here to reset