Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 04 July 2022

Defending Software Systems against Cyber Attacks throughout Their Lifecycle

Defending Software Systems against Cyber Attacks throughout Their Lifecycle

(p.74) Defending Software Systems against Cyber Attacks throughout Their Lifecycle
Advances in Cyber Security

Hira Agrawal

Thomas F. Bowen

Sanjai Narain

Fordham University Press

Malware enters a software system along three avenues: it is hidden surreptitiously within applications by a malicious developer; it is inserted into the system due to an accidental or a deliberate misconfiguration of the deployment environment; and it is injected into a running application by a malicious user by exploiting a programming flaw in the application logic. This chapter describes three tools developed at Telcordia for blocking all these avenues: Software Visualization and Analysis Toolsuite (TSVAT) system, ConfigAssure system, and Runtime Monitoring. TSVAT helps application testers conserve testing resources by guiding them to hidden code. ConfigAssure helps system administrators in creating vulnerability-free distributed application configuration. Runtime Monitoring protects against the exploitation of vulnerabilities not caught by any other technique. These tools have been trialed or are being deployed in real enterprises. Together, they offer a comprehensive defense against attacks on software systems throughout their lifecycle.

Keywords:   cyber security, cyber attacks, software systems, malware, Telcordia, Software Visualization and Analysis Toolsuite, system, ConfigAssure system, Runtime Monitoring

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .