Information technology security evaluation using CERT C secure coding standard

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

IT products developed without due consideration of security issues have caused many security accidents over the last ten years. As a result, the importance of security in software development is increasing. It is important to ensure that no known vulnerabilities remain in the design, development, and test stage, in order to develop secure IT products. Even when an IT product is designed securely, various security vulnerabilities can occur, such as buffer overflow, if the general coding technique is used at the development stage. Therefore, the introduction of secure coding rules becomes most critical in developing a robust information security product. This paper proposes a method of applying a secure coding standard in the CC evaluation process. The proposed method is expected to contribute to improving the security of IT products in the CC evaluation process. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Lee, T., Lee, K., Won, D., & Park, N. (2011). Information technology security evaluation using CERT C secure coding standard. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7105 LNCS, pp. 335–342). https://doi.org/10.1007/978-3-642-27142-7_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free