Show simple item record

dc.contributor.authorNguyen-Duc, Anh
dc.contributor.authorDo, Manh Viet
dc.contributor.authorLuong Hong, Quan
dc.contributor.authorNguyen Khac, Kiem
dc.contributor.authorNguyen Quang, Anh
dc.date.accessioned2022-03-28T09:33:37Z
dc.date.available2022-03-28T09:33:37Z
dc.date.created2021-10-12T16:40:02Z
dc.date.issued2021
dc.identifier.citationNguyen-Duc, A., Do, M. V., Luong Hong, Q., Nguyen Khac, K. & Nguyen Quang, A. (2021). On the adoption of static analysis for software security assessment–A case study of an open-source e-government project. Computers & Security, 111, Artikkel 102470.en_US
dc.identifier.issn0167-4048
dc.identifier.urihttps://hdl.handle.net/11250/2987879
dc.description.abstractStatic Application Security Testing (SAST) is a popular quality assurance technique in software engineering. However, integrating SAST tools into industry-level product development for security assessment poses various technical and managerial challenges. In this work, we reported results from a case study of adopting SAST as a part of a human-driven security assessment process in an open-source e-government project. We described how SASTs are selected, evaluated, and combined into a novel approach and adopted by security experts for software security assessment. The approach was preliminarily evaluated using semi-structured interviews. Our results show that while some SAST tools out-perform others, it is possible to achieve better performance by combining more than one SAST tools. The combined approach has the potential to aid the security assessment process for open-source software.en_US
dc.language.isoengen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleOn the adoption of static analysis for software security assessment–A case study of an open-source e-government projecten_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2021 The Authors. Published by Elsevier Ltd.en_US
dc.source.volume111en_US
dc.source.journalComputers & Securityen_US
dc.identifier.doihttps://doi.org/10.1016/j.cose.2021.102470
dc.identifier.cristin1945429
dc.source.articlenumber102470en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal