Vis enkel innførsel

dc.contributor.authorNguyen-Duc, Anh
dc.contributor.authorDo, Manh Viet
dc.contributor.authorLuong Hong, Quan
dc.contributor.authorNguyen Khac, Kiem
dc.contributor.authorNguyen Quang, Anh
dc.date.accessioned2022-03-28T09:33:37Z
dc.date.available2022-03-28T09:33:37Z
dc.date.created2021-10-12T16:40:02Z
dc.date.issued2021
dc.identifier.citationNguyen-Duc, A., Do, M. V., Luong Hong, Q., Nguyen Khac, K. & Nguyen Quang, A. (2021). On the adoption of static analysis for software security assessment–A case study of an open-source e-government project. Computers & Security, 111, Artikkel 102470.en_US
dc.identifier.issn0167-4048
dc.identifier.urihttps://hdl.handle.net/11250/2987879
dc.description.abstractStatic Application Security Testing (SAST) is a popular quality assurance technique in software engineering. However, integrating SAST tools into industry-level product development for security assessment poses various technical and managerial challenges. In this work, we reported results from a case study of adopting SAST as a part of a human-driven security assessment process in an open-source e-government project. We described how SASTs are selected, evaluated, and combined into a novel approach and adopted by security experts for software security assessment. The approach was preliminarily evaluated using semi-structured interviews. Our results show that while some SAST tools out-perform others, it is possible to achieve better performance by combining more than one SAST tools. The combined approach has the potential to aid the security assessment process for open-source software.en_US
dc.language.isoengen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleOn the adoption of static analysis for software security assessment–A case study of an open-source e-government projecten_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2021 The Authors. Published by Elsevier Ltd.en_US
dc.source.volume111en_US
dc.source.journalComputers & Securityen_US
dc.identifier.doihttps://doi.org/10.1016/j.cose.2021.102470
dc.identifier.cristin1945429
dc.source.articlenumber102470en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal