A method for recommending computersecurity training for software developers

<p>Vulnerable code may cause security breaches in software systems resulting in financial and reputation losses for the organizations in addition to loss of their customers confidential data. Delivering proper software security training to software developers is key to prevent such breaches. C...

Full description

Bibliographic Details
Main Author: Nadeem, Muhammad
Other Authors: Byron J. Williams
Format: Others
Language:en
Published: MSSTATE 2016
Subjects:
Online Access:http://sun.library.msstate.edu/ETD-db/theses/available/etd-06292016-143609/
id ndltd-MSSTATE-oai-library.msstate.edu-etd-06292016-143609
record_format oai_dc
spelling ndltd-MSSTATE-oai-library.msstate.edu-etd-06292016-1436092019-05-15T18:43:59Z A method for recommending computersecurity training for software developers Nadeem, Muhammad Computer Science and Engineering <p>Vulnerable code may cause security breaches in software systems resulting in financial and reputation losses for the organizations in addition to loss of their customers confidential data. Delivering proper software security training to software developers is key to prevent such breaches. Conventional training methods do not take the code written by the developers over time into account, which makes these training sessions less effective. We propose a method for recommending computersecurity training to help identify focused and narrow areas in which developers need training. The proposed method leverages the power of static analysis techniques, by using the flagged vulnerabilities in the source code as basis, to suggest the most appropriate training topics to different software developers. Moreover, it utilizes public vulnerability repositories as its knowledgebase to suggest community accepted solutions to different security problems. Such mitigation strategies are platform independent, giving further strength to the utility of the system.</p> <p> This research discussed the proposed architecture of the recommender system, case studies to validate the system architecture, tailored algorithms to improve the performance of the system, and human subject evaluation conducted to determine the usefulness of the system.</p> <p> Our evaluation suggests that the proposed system successfully retrieves relevant training articles from the public vulnerability repository. The human subjects found these articles to be suitable for training. The human subjects also found the proposed recommender system as effective as a commercial tool. </p> Byron J. Williams David A. Dampier Gary Bradshaw Robert Wesley McGrew MSSTATE 2016-07-22 text application/pdf http://sun.library.msstate.edu/ETD-db/theses/available/etd-06292016-143609/ http://sun.library.msstate.edu/ETD-db/theses/available/etd-06292016-143609/ en unrestricted I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, Dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Mississippi State University Libraries or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, Dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, Dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, Dissertation, or project report.
collection NDLTD
language en
format Others
sources NDLTD
topic Computer Science and Engineering
spellingShingle Computer Science and Engineering
Nadeem, Muhammad
A method for recommending computersecurity training for software developers
description <p>Vulnerable code may cause security breaches in software systems resulting in financial and reputation losses for the organizations in addition to loss of their customers confidential data. Delivering proper software security training to software developers is key to prevent such breaches. Conventional training methods do not take the code written by the developers over time into account, which makes these training sessions less effective. We propose a method for recommending computersecurity training to help identify focused and narrow areas in which developers need training. The proposed method leverages the power of static analysis techniques, by using the flagged vulnerabilities in the source code as basis, to suggest the most appropriate training topics to different software developers. Moreover, it utilizes public vulnerability repositories as its knowledgebase to suggest community accepted solutions to different security problems. Such mitigation strategies are platform independent, giving further strength to the utility of the system.</p> <p> This research discussed the proposed architecture of the recommender system, case studies to validate the system architecture, tailored algorithms to improve the performance of the system, and human subject evaluation conducted to determine the usefulness of the system.</p> <p> Our evaluation suggests that the proposed system successfully retrieves relevant training articles from the public vulnerability repository. The human subjects found these articles to be suitable for training. The human subjects also found the proposed recommender system as effective as a commercial tool. </p>
author2 Byron J. Williams
author_facet Byron J. Williams
Nadeem, Muhammad
author Nadeem, Muhammad
author_sort Nadeem, Muhammad
title A method for recommending computersecurity training for software developers
title_short A method for recommending computersecurity training for software developers
title_full A method for recommending computersecurity training for software developers
title_fullStr A method for recommending computersecurity training for software developers
title_full_unstemmed A method for recommending computersecurity training for software developers
title_sort method for recommending computersecurity training for software developers
publisher MSSTATE
publishDate 2016
url http://sun.library.msstate.edu/ETD-db/theses/available/etd-06292016-143609/
work_keys_str_mv AT nadeemmuhammad amethodforrecommendingcomputersecuritytrainingforsoftwaredevelopers
AT nadeemmuhammad methodforrecommendingcomputersecuritytrainingforsoftwaredevelopers
_version_ 1719086200401166336