TV Interview on Smart Home Security

Eric | March 1, 2017

The local television interviewed me today on Smart Home Security. You can watch the video here. Skip to about 9 minutes.

Cross-posted from Secure Software Engineering

Comments
Comments Off on TV Interview on Smart Home Security
Categories
Misc, Research, Uncategorized

ESSoS & ESEC/FSE Submission deadlines approaching

Eric | February 18, 2017

Submissions will soon be due for submissions to ESSoS and ESEC/FSE:

  • ESSoS: Friday, Feb 24th
  • ESEC/FSE: Monday, Feb 27th

Are you a student and worried about insufficient funds to attend ESEC/FSE? Then check out this page, which might be helpful to you.

Are you worried about the U.S. travel ban or visa issues in general? Then contact the general chair to discuss your specific issue in advance. We hope to see you all in Germany this summer!

Comments
Comments Off on ESSoS & ESEC/FSE Submission deadlines approaching
Categories
Uncategorized

Heise devSec()

Eric | January 26, 2017

Heise devSecThis year I am co-organizing Heise devSeC(), a new developer conference on secure software engineering. We welcome your submission by May 8th!

Cross-posted from Secure Software Engineering

Comments
Comments Off on Heise devSec()
Categories
Misc, Research, Uncategorized

Join us at ESEC/FSE 2017 – in September in Paderborn

Eric | January 26, 2017

Further information available here

Cross-posted from Secure Software Engineering

Comments
Comments Off on Join us at ESEC/FSE 2017 – in September in Paderborn
Categories
Misc, Research, Uncategorized

Help us improve Soot by giving us your feedback!

Eric | December 16, 2016

Soot LogoOver the past years, Soot has seen a larger and larger user base. It makes us happy that so many people find Soot useful, and we particularly enjoy also the help we have received in terms of feedback, bug reports, bug fixes or even newly contributed features. Thanks for giving back!

Early 2017 we plan to apply for government funding to aid the future development and maintenance of Soot. 

Sounds great? Then please support us by filling out this little web form.

That way you can help us in two ways:

  • By letting us know how we can improve Soot you can directly help us prioritize newly planned features.
  • By stating your name and affiliation you help us showcasing Soot’s large user base.

Thanks!

Cross-posted from Secure Software Engineering

Comments
Comments Off on Help us improve Soot by giving us your feedback!
Categories
Misc, Research, Uncategorized

NRW’s research agenda on Human-centered Systems Security

Eric | December 16, 2016

Research AgendaWe have now released the IT-security agenda which Thorsten Holz, Norbert Pohlmann, Matthew Smith and Jörg Hoffmann have proposed for our state of North-Rhine Westphalia. As one of the probably first major research endeavours worldwide it will put the humans into the focus of the IT-security research. The agenda is available for download here.

Cross-posted from Secure Software Engineering

Comments
Comments Off on NRW’s research agenda on Human-centered Systems Security
Categories
Misc, Research, Uncategorized

Harvester scores 1st place at German IT-Sicherheitspreis

Eric | October 10, 2016
Copyright: Catharina Frank

Copyright: Catharina Frank

Harvester has scored 1st place at this year’s German IT-Sicherheitspreis! Every two years, the Horst Görtz Foundation awards EUR 200,000 to the three winners, with the first place being awarded EUR 100,000. More at Heise (in German)

Many thanks to the judges and the foundation! Harvester will is planned to be available soon as a plugin into our CodeInspect framework. We are further thinking of providing a command-line version to interested customers.

Cross-posted from Secure Software Engineering

Comments
Comments Off on Harvester scores 1st place at German IT-Sicherheitspreis
Categories
Misc, Research, Uncategorized

Talks at the Second International Workshop on Agile Secure Software Development (ASSD’16)

Eric | October 7, 2016

The workshop was an opportunity to share experiences and ideas about developing secure software using the agile processes. Hasan Yasar from the Software Engineering Institute (SEI), CMU opened the sessions with a keynote talk on the experience of SEI in integrating security to DevOps for its clients.  He talked about on how DevOps principles were applied to develop secure applications, from idea to delivery of a completed application to production environment, also including operational support and incident response. He explained how to address application security concerns at early development lifecycle and how to address threats at different decisions point using integrated DevOps platforms. He emphasized the value of reference architecture, team collaboration, organization’s culture, considering security through development lifecycle, and continuous feedback.

The keynote was followed by a talk given by Vaishnavi Mohan, who discussed the aspects that SecDevOps authors have been discussing in the literature. Tosin Daniel Oyetoyan reported, in the second session, about his study on the relationships between software security skills, usage and training needs in Agile settings in two Norwegian companies. They observed that there is a positive linear relationship between the practice of security activities in software development projects and the skills and knowledge of the participating developers about software security. This suggests, if confirmed with more studies, that training developers on developing secure software leads to the production of secure software. Next Kalle Rindell gave an overview about the experience he has with his colleagues in building secure identity management system in an agile environment for the Finnish government. Lotfi ben Othmane discussed in the third talk the study they had on incremental security assurance for the e-commerce software, Zen Cart.

In the afternoon session Chad Heitzenrater discussed the application of economic utility functions within the negative use case development process to help development managers decide on the alternatives to mitigate the abuse cases. The presentation was followed by the talk of Daniela S. Cruzes, who reported about a study they performed to identify the factors that influence testing of nonfunctional requirements in agile teams, which are priority, culture, awareness, time pressure, cost, and technical issues.

 

The full ARES program, including the workshop program is available here

Cross-posted from Secure Software Engineering

Comments
Comments Off on Talks at the Second International Workshop on Agile Secure Software Development (ASSD’16)
Categories
Misc, Research, Uncategorized

Time for Addressing Software Security Issues: Prediction Models and Impacting Factors

Eric | October 7, 2016

The second paper resulting from our collaboration with SAP on developing models for estimating the time to fix security issues is published by the Data Science and Engineering journal, Springer. We investigate, in this paper, quantitatively the major factors that impact the time it takes to fix a given security issue based on data collected automatically within SAP’s secure development process, and we show how the issue fix time could be used to monitor the fixing process. The work shows that the time it takes to fix an issue seems much more related to the component in which the potential vulnerability resides, the project related to the issue, the development groups that address the issue, and the closeness of the software release date. This indicates that the software structure, the fixing processes, and the development groups are the dominant factors that impact the time spent to address security issues. The models could be used to implement a continuous improvement of the secure software development processes and to measure the impact of individual improvements. The paper is published as open source and is available here.

Cross-posted from Secure Software Engineering

Comments
Comments Off on Time for Addressing Software Security Issues: Prediction Models and Impacting Factors
Categories
Misc, Research, Uncategorized

An In-Depth Study of More Than Ten Years of Java Exploitation

Eric | August 16, 2016

I am happy and proud to present our first CCS paper! Co-authored with Philipp Holzinger, Stefan Triller and Alexandre Bartel, we present an in-depth study of all available Java exploits we were able to find online. The exploits cover all different sorts of attack vectors and more than 15 years, they highlight important weaknesses in the Java runtime. The study explains in detail the different weaknesses the exploits exploit. The paper is available here already. Further, we will soon make available some artifacts on this website (not the exploits, though).

Thanks to Marco Pistoia for his constructive feedback and Julian Dolby for providing us with the IBM JDKs we required for our study! Thanks also to Oracle which supported us through a Collaborative Research Grant and to the DFG’s Priority Program 1496 Reliably Secure Software Systems who funded the work through its project INTERFLOW!

See you all at Vienna!

Cross-posted from Secure Software Engineering

Comments
Comments Off on An In-Depth Study of More Than Ten Years of Java Exploitation
Categories
Misc, Research, Uncategorized