IT products developed without due consideration of security issues have caused many security accidents over the last ten years. As a result, the importance of security in software development is increasing. It is important to ensure that no known vulnerabilities remain in the design, development, and test stage, in order to develop secure IT products. Even when an IT product is designed securely, various security vulnerabilities can occur, such as buffer overflow, if the general coding technique is used at the development stage. Therefore, the introduction of secure coding rules becomes most critical in developing a robust information security product. This paper proposes a method of applying a secure coding standard in the CC evaluation process. The proposed method is expected to contribute to improving the security of IT products in the CC evaluation process. © 2011 Springer-Verlag.
CITATION STYLE
Lee, T., Lee, K., Won, D., & Park, N. (2011). Information technology security evaluation using CERT C secure coding standard. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7105 LNCS, pp. 335–342). https://doi.org/10.1007/978-3-642-27142-7_39
Mendeley helps you to discover research relevant for your work.