Uploaded by João Silva

Zhou 2022 J. Phys. Conf. Ser. 2173 012041

advertisement
Journal of Physics: Conference Series
You may also like
PAPER • OPEN ACCESS
Application Research on Key Points of Software
Security Development Technology
To cite this article: He Zhou 2022 J. Phys.: Conf. Ser. 2173 012041
- Complexity Estimation for Distributed
Software Development Using SRS
Agarwal Apurva
- Design and Practice of Software
Architecture in Agile Development
Ding Yong
- Development Trend of Computer Artificial
Intelligence Technology Optimization
Strategy in Software Development
Saidong Liu
View the article online for updates and enhancements.
This content was downloaded from IP address 200.130.19.236 on 07/11/2023 at 11:41
ICMSOA 2021
Journal of Physics: Conference Series
2173 (2022) 012041
IOP Publishing
doi:10.1088/1742-6596/2173/1/012041
Application Research on Key Points of Software Security
Development Technology
He Zhou
School of Computer and Information Engineering, Nanchang Institute of Technology,
Nanchang, Jiangxi 330044, China
*
corresponding author’s e-mail: 51001202@qq.com
Abstract. With the rapid development of network technology, software security has
attracted more and more attention. Based on the software security lifecycle presents an
improved suitable for small and medium-sized enterprise software security development
process, make the software safety to cover the whole software life cycle, improve the level
of safety of encoding software. The model used in the software development phase, test
phase and release phase three software security key technologies are studied and discussed
in detail. In addition, it also designed a software security development management
platform, the software development process so that the model can better apply to the actual
enterprise to the platform. After a number of units for a period of time of trial, get a better
evaluation of the households.
Keywords. Software security; key technology; development; network
1. Introduction
The software product with everything else, but also through birth, birth, growth, maturity, decline
stage, in software engineering we commonly known as the software life cycle [1]. Through the whole
life cycle of software is divided into several stages, each stage has a clear mandate, the scale is big,
easy to control and management of complex software the development and management of the
complex [2]. Usually, the software life cycle including feasibility analysis and development plan,
requirement analysis, design, encoding, testing, maintenance and other activities, these activities can
be in a proper way assigned to different stages to complete [3]. This method divided the process is a
principle, in software engineering, which follow the prescribed order step by step, each stage, have
defined work, review, document for communication or for reference, in order to improve the quality of
software.
This stage is to discuss the software development and demand, mainly to determine the
development goals and the feasibility of the software [4]. The feasibility study is usually the feasibility
of the project report to top management for software development funds, usually from the economic,
business or organization, and technology in project feasibility assessment. In addition, feasibility to
continue the project tracking and research progress of information management system of the
evaluation team also can be used as a reference [5]
In the software development is feasible; the detailed analysis of the various functions of the
software needs to realize [6]. The demand analysis stage is a very important stage, this stage is well
done, will be a good foundation for the software development project success lay. "The only constant
is change itself, the same." demand is constantly changing during the whole process of software
development and in-depth, so we must make changes in demand plan to deal with this change, in order
to protect the smooth progress of the project.
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd
1
ICMSOA 2021
Journal of Physics: Conference Series
2173 (2022) 012041
IOP Publishing
doi:10.1088/1742-6596/2173/1/012041
This stage is mainly based on the results of requirement analysis, the design of the function and
operation of the entire software system, such as system framework design, database design, user
interface layout, business rules, and system flow and so on. At the end of this period, we will make the
whole system design described as a series of modules or subsystems of software design [7]. Generally
divided into the overall design and detailed design for each demand system, will be on or make a
prototype system to produce one or more key points of the design. The software design phase is a
crucial stage in the whole software life cycle. In the design stage if there is some design errors later, in
the software you want to restore the price is very expensive. And good software design for software
programming and lays a good foundation.
To go through rigorous testing in the software design is completed, to found in the whole design
process of software problems and correct. The whole test process is divided into three stages of unit
testing, assembly test and system test. The test methods include white box testing and black box
testing in two. In the course of the testing a detailed test plan and test strictly according to the test plan,
test to reduce the randomness.
2. Overview of community Gymnastics Teaching
Traditional software development model mainly includes the waterfall model, spiral model,
incremental model. They mainly focus on the development of the quality of the software process, the
development efficiency, and not too much attention to software security. Due to the lack of emphasis
on security model, to bring a variety of security risks to the software products in the development
process of software project, the security of the software cannot be improved, may eventually be due to
some security vulnerabilities in the software to software developers and end users have suffered
varying degrees of loss.
2.1. Disadvantages of traditional gymnastic teaching methods
In order to make the software to deal with current security threats, it is necessary to improve the safety
awareness in the process of software development, the software in the whole life cycle of the safety of
the software, improve software security products. In this paper, the software security development
processes are introduced, and makes comparison and analysis on them at present the software security
development process mainly needs more resources based on small and medium enterprises, barriers to
the status quo in the application process, the software security development lifecycle is proposed
based on an improved suitable for small and medium-sized enterprise software security development
process, make the software safety to cover the whole software life cycle, safety and cost saving
enterprises, improve the level of software security.
At present, the security threats faced by software products, which mainly includes two aspects: the
people's attention. On the one hand is a software product of the crack, illegal dissemination and use,
and security vulnerabilities on the other hand from the attacker for the software product itself for the
attack. The two, whether it is from which aspects of the threat, will bring huge losses to the enterprise.
The problem of copyright protection on software, while software developers tried various ways to
use disk protection, hardware protection, software encryption shell and other technical means, hackers
can always find ways to solve the corresponding, to completely prevent piracy is not too realistic. And
there are some security vulnerabilities in software is often break and software are the relationship
between hackers can obtain information related to the logical flow of software through software
security vulnerabilities, which makes it possible to break the software.
The problem of copyright protection of software are mainly on the illegal copying and illegal use of
software, namely software piracy software. As a product often will bring huge economic and social
benefits, and its value has also been more attention. And because of the characteristics of digital
software, the software has the cost of reproduction low copy, high efficiency characteristics, so often
become the object of copyright infringement. From the development of Internet technology, but also to
the spread of digital products including software has brought great convenience, so that the issue of
intellectual property protection has become increasingly prominent as shown in figure 1.
2
ICMSOA 2021
Journal of Physics: Conference Series
2173 (2022) 012041
IOP Publishing
doi:10.1088/1742-6596/2173/1/012041
Figure 1. Software internal control flow chart
2.2. Feasibility analysis of application of multimedia technology in the teaching of Gymnastics
With the development of the concept of cloud computing, more and more software available to users
through the network service, which undoubtedly brings users great convenience, users need only a
browser can be used for shopping, entertainment and communication services of all kinds. For
enterprise users, enterprises can also be through the release of information, network services, network
marketing, customer service, and business partners as well as online contract or commodity trading
business. However, due to security vulnerabilities of software services and browser vulnerabilities,
steal information, data tampering and other illegal attacks it is often seen. Often cause serious harm,
and losses to the use of software users and software network the service of software developers.
The Internet enables people to use the software more convenient, but also give the attacker the
opportunity to bring more risk to the software. The open nature of the Internet makes the hacker
software system of enterprise development at the same time because whenever and wherever possible
access to the platform is open to the enterprise is very difficult to distinguish between legitimate users
and hackers. This makes hackers than in the past the more time and space to attack the software
system, found in the software security defects and use it.
At present, the software application system scalability are relatively high, often through the
installation and update the plug-in to the system functions are expanded to meet the changing needs of
users. For example, support plug-ins and browsers on its official website provides a large number of
various functions by third party development plugin for the user to choose the use of the operating
system can support a variety of hardware devices by dynamically loading device driver according to
their own needs. The scalability of the software brings users great freedom and can be customized, but
to the security of software has brought great challenges. Because the third party development level
encoding expansion function and attention the degree of safety of the uneven, often lead to a security
vulnerability in the extended function cause the entire software security defense collapsed as shown in
formula (1).
−x ±
x 2 − 4yz
= x 2 + z 2 � x 2 − 4yz
2y
(1)
Most programmers think in the preparation of the program the program is run in a way. In fact, the
modern computer is very fast in task switching, in multi-core, multi or distributed system, often have a
time to happen at the same time the exact time. Between the programming ideas and the real situation
of existence a lot of program weaknesses. These security vulnerabilities by thread, process, time, and
state between the non expected interaction caused.
3
ICMSOA 2021
Journal of Physics: Conference Series
2173 (2022) 012041
IOP Publishing
doi:10.1088/1742-6596/2173/1/012041
3. The development and application of multimedia technology in the teaching of community
sports
Error and error handling on behalf of a class, but with the error handling security issues is very
common, and as a separate category. There are two kinds of error handling cases will have security
vulnerabilities. One is the lack of error or no error handling, a situation this is the most common. The
other one is in error when leaked too much information, or processing error is safe.
3.1. The necessity of making gymnastic courseware
At present, the Internet has become a very important platform, and with the concept of cloud
computing, many enterprises are based on the development of software system, to provide customers
with more convenient and efficient service support. These applications in function and performance,
are constantly improving and improving, but in safety very important, but did not get enough attention.
Most of the enterprises will be a large number of investment spending in the network and server
security, there is no guarantee that the application of its own security in the real sense, to hackers.
According to the annual report, in the application security vulnerabilities list of the ten most serious
were the top three cross site scripting, injection vulnerabilities and malicious files. The cause of the
implementation [three vulnerabilities is direct and not to do enough to check user input caused. Seven
vulnerabilities are also and there is more or less user input.
XSS vulnerability is due to a system without a good filter out user submitted content in the
executable script caused. Using XSS vulnerabilities, an attacker can remotely submit malicious scripts
into the system to access the system; users will perform these attacks from malicious script by ". A
XSS attack usually to the attacker, and attack the client site out of the three groups.
The user must suffer by their own initiative to complete the submission to make malicious scripts,
malicious scripts can access to the user's privacy information, so the attacker will usually constructs a
malicious script link, using a variety of methods to lure victims of active users to click on the link in
order to complete the attack as shown in figure 2.
Figure 2. The software flow chart analysis
The above example is the use of a non-persistent cross site scripting attacks. This kind of
vulnerability is usually due to the usual user supplied data is parameters in the request or submit the
page from the data in the form; the server did not filter directly used to generate returns to the user
page results formed. Submit data is not stored in the server. This case is as shown in figure 3.
4
ICMSOA 2021
Journal of Physics: Conference Series
2173 (2022) 012041
IOP Publishing
doi:10.1088/1742-6596/2173/1/012041
Figure 3. Control gate program
3.2. The function, principle, method and condition of developing multimedia technology
Persistent XSS vulnerability is usually more serious. When kept in the server stored in the database
such as persistent attacker submitted data, then the data is not verified displayed on other users usually
may access the page, will be stored in persistent XSS vulnerabilities. A typical example is that if an
online forum allows users to use directly in the code at the post, it will cause persistent XSS
vulnerabilities, because online forum posting is usually stored in the database, and posting content can
be all users to see. A big problem existing in software security is that many software systems do not
have a good sense of safety in the construction process. Software developers mostly take a better
attitude; will focus more on the repair of software security issues, rather than an effort to create safe
software from the beginning.
Even some software developers have a misunderstanding on software security issues, often the
safety investment used in the procurement of equipment such as firewall, old for protection from the
network layer attacks, leaving only the security of the software itself for the rest. In fact, the statistical
data presented show that only the attack is realized by network protocols or hardware vulnerabilities,
and the hacker attacks on the application layer, the use of software security vulnerabilities exist in the
attack. For these attacks using software vulnerabilities, security devices in the network layer can play a
protective role. Only the safety investment against a possible attack this is also the reason that some
software security is poor as shown in figure 4.
5
ICMSOA 2021
Journal of Physics: Conference Series
2173 (2022) 012041
IOP Publishing
doi:10.1088/1742-6596/2173/1/012041
Figure 4. User praise
4. Discussions
Although the enterprise in the software development process for software security problems have been
more and more attention, but the application of the software security development process is still not
ideal. The survey report pointed out that the scale of the enterprise is one of the important factors that
influence the enterprise whether the security development process in the software development
process. At present, several major software security development process needs large resources of
large enterprises, they can afford more safety tools and safety activities overhead for funds, the lack of
human resources of small and medium enterprises to say, application software security development
process, there is still a significant obstacle. Therefore, it is necessary for the lack of resources of small
and medium sized enterprises some consider must optimize the software security development process.
On the basis, the process is simplified, a better applied to the lightweight software security
development process of small and medium enterprises, and the first two chapters put forward dynamic
watermarking based on dynamic data dependence graph, software protection technology of dynamic
security analysis of dynamic data dependence and some other existing software security technology
based on the combination of. Has the same security as the core, to software security coverage to the
characteristics of each stage of the software life cycle.
And different, involving safety software security development process proposed by this paper, is not
fully in accordance with the order, but there is overlap in time, in order to save time and cost. We also
emphasize the use of free security tools, and security tools for automatic configuration, a part of the
regular automatic safety activities the work, save money, time and manpower. Software security
development process is the goal of software security issues in the design and implementation of the
reduction in the software development life cycle as early as possible during the macro grasp of
software safety in the whole process of software development, improve software security, severity
reduce the impact of any security issues not found in the software.
5. Conclusion
The work of this paper is the first from the two aspects of copyright protection and security
vulnerabilities summarizes the security threats facing the software. In order to make the software to
deal with current security threats, it is necessary to improve the safety awareness in the process of
software development, software in the whole life cycle of software safety concerns, improve safety
software products. Based on the software security development processes are introduced, and they are
compared and analyzed. Then the current software security development process mainly needs more
resources based on small and medium enterprises, barriers to the status quo in the application process,
based on software security development life cycle forward improved suitable for small and medium
6
ICMSOA 2021
Journal of Physics: Conference Series
2173 (2022) 012041
IOP Publishing
doi:10.1088/1742-6596/2173/1/012041
enterprises software development process, software security is able to cover the entire software life
cycle, save enterprise security Total cost, improve the level of software security. The software security
development process based on the improved design and implementation of a software development
management platform, the purpose is to enable enterprises to better in the software development
process of application software security development process, the software development process of
effective management, as far as possible early discovery and repair security vulnerabilities in the
software, security the final software was significantly improved. The platform after a number of units
for a period of time after the trial, get a better evaluation.
Acknowledgement
Project Fund: Collaborative Education by the Ministry of Education, Fund No. 202101196010,
Application of Network Crawber in Big Data Teaching.
References
[1] Evren G 2016 Preparation for Central Common Examination is not a Torment but Fun Procedia
Social and Behavioral Sciences 232(24) 47-56
[2] Hu Y N 2017 Research on the Application of Fault Tree Analysis for Building Fire Safety of
Hotels Procedia Engineering 135(1) 45-6
[3] Flaherty G T 2016 Research on the move: the potential applications of mobile health
technology in travel medicine Journal of Travel Medicine 23(6) 49-55
[4] Maja S J, Radmila B, Bojan L 2016 A Proposal for Research Framework Based on The
Theoretical Analysis and Practical Application of MLQ Questionnaire Conomic Themes 4(4) 56
[5] Petros T, ikolaos S 2016 Editorial to the IFSET Special Issue “Advances in research
and applications of nonthermal technologies for food processing and preservation” based on
the 2015 International Nonthermal Processing Workshop Innovative Food Science and
Emerging Technologies 38(1) 220-7
[6] Pattanapong W 2016 Errors in translation made by English major students: A study on types
and causes Kasetsart Journal of Social Sciences 783(26) 89-102
[7] Agnes A O 2017 The Abolishment of Colleges and its Implications on ELT in Nigeria Procedia
- Social and Behavioral Sciences 232(24) 567-9
7
Download