Skip to main content
Top

2018 | OriginalPaper | Chapter

CodeTrust

Trusting Software Systems

Authors : Christian Damsgaard Jensen, Michael Bøndergaard Nielsen

Published in: Trust Management XII

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The information society is building on data and the software required to collect and analyse these data, which means that the trustworthiness of these data and software systems is crucially important for the development of society as a whole. Efforts to establish the trustworthiness of software typically include parameters, such as security, reliability, maintainability, correctness and robustness.
In this paper we explore ways to determine the trustworthiness of software, in particular code where some of the constituent components are externally sourced, e.g. through crowd sourcing and open software systems. We examine different quality parameters that we believe define key quality indicators for trustworthy software and define CodeTrust, which is a content based trust metric for software.
We present the design and evaluation of a research prototype that implements the proposed metric, and show the results of preliminary evaluations of CodeTrust using well known open source software projects.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
OpenSSL is a widely used implementation of the Transport Layer Security (TLS) protocol [9], which allows two computers on the Internet to establish secure communication. It is often used by embedded systems and open source software, such as the Apache and nginx webservers which, at the time, powered around two thirds of the websites on the Internet.
 
2
The Common Critera captures the Protection Profile (PP) and the Security Target (ST) and measures the Evaluation Assurance Level (EAL), which depends on the depth and rigour of the security evaluation.
 
Literature
2.
go back to reference Amoroso, E., Taylor, C., Watson, J., Weiss, J.: A process-oriented methodology for assessing and improving software trustworthiness. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 39–50 (1994) Amoroso, E., Taylor, C., Watson, J., Weiss, J.: A process-oriented methodology for assessing and improving software trustworthiness. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 39–50 (1994)
3.
go back to reference Avizienis, A., Laprie, J.C., Randell, B.: Fundamental concepts of dependability. In: Proceedings of the 3rd IEEE Information Survivability Workshop (2000) Avizienis, A., Laprie, J.C., Randell, B.: Fundamental concepts of dependability. In: Proceedings of the 3rd IEEE Information Survivability Workshop (2000)
6.
go back to reference Cerrudo, C.: Why the Shellshock Bug is Worse than Heartbleed. MIT Technology Review, Cambridge (2014) Cerrudo, C.: Why the Shellshock Bug is Worse than Heartbleed. MIT Technology Review, Cambridge (2014)
7.
go back to reference Commission of the European Communities: Information Technology Security Evaluation Criteria (ITSEC): Preliminary Harmonised Criteria Commission of the European Communities: Information Technology Security Evaluation Criteria (ITSEC): Preliminary Harmonised Criteria
9.
go back to reference Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, The Internet Engineering Task Force (2008) Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, The Internet Engineering Task Force (2008)
10.
go back to reference Fitzpatrick, J.: Applying the ABC metric to C, C++, and Java. In: More c++ Gems, pp. 245–264. Cambridge University Press, New York (2000). Originally published in C++ Report, June 1997 Fitzpatrick, J.: Applying the ABC metric to C, C++, and Java. In: More c++ Gems, pp. 245–264. Cambridge University Press, New York (2000). Originally published in C++ Report, June 1997
11.
go back to reference Halstead, M.H.: Elements of Software Science (Operating and Programming Systems Series). Elsevier Science Inc., New York (1977)MATH Halstead, M.H.: Elements of Software Science (Operating and Programming Systems Series). Elsevier Science Inc., New York (1977)MATH
12.
go back to reference ISO/IEC 15408: Common Criteria for Information Technology Security Evaluation ISO/IEC 15408: Common Criteria for Information Technology Security Evaluation
13.
go back to reference Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)CrossRef Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)CrossRef
14.
go back to reference Mohammadi, N.G., Sachar Paulus, M.B., Metzger, A., Koennecke, H., Hartenstein, S., Pohl, K.: An analysis of software quality attributes and their contribution to trustworthiness. In: Proceedings of the 3rd International Conference on Cloud Computing and Services Science, Closer 2013, vol. 3, no. 3, pp. 542–552 (2013) Mohammadi, N.G., Sachar Paulus, M.B., Metzger, A., Koennecke, H., Hartenstein, S., Pohl, K.: An analysis of software quality attributes and their contribution to trustworthiness. In: Proceedings of the 3rd International Conference on Cloud Computing and Services Science, Closer 2013, vol. 3, no. 3, pp. 542–552 (2013)
15.
go back to reference Nielsen, M.B.: Quality and IT security assessment of open source software projects. M.Sc. thesis, DTU Compute, Technical University of Denmark (2017) Nielsen, M.B.: Quality and IT security assessment of open source software projects. M.Sc. thesis, DTU Compute, Technical University of Denmark (2017)
18.
go back to reference Randell, B.: System structure for software fault tolerance. SIGPLAN Not. 10(6), 437–449 (1975)CrossRef Randell, B.: System structure for software fault tolerance. SIGPLAN Not. 10(6), 437–449 (1975)CrossRef
19.
go back to reference Seggelmann, R., Tuexen, M., Williams, M.: Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension. RFC 6520, The Internet Engineering Task Force (2012) Seggelmann, R., Tuexen, M., Williams, M.: Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension. RFC 6520, The Internet Engineering Task Force (2012)
20.
go back to reference The Department of Defense (DoD): Trusted Computer System Evaluation Criteria (TCSEC), TCSEC Rainbow Series Library, Orange Book The Department of Defense (DoD): Trusted Computer System Evaluation Criteria (TCSEC), TCSEC Rainbow Series Library, Orange Book
23.
go back to reference Thompson, K.: Reflections on trusting trust. Commun. ACM 27(8), 761–763 (1984)CrossRef Thompson, K.: Reflections on trusting trust. Commun. ACM 27(8), 761–763 (1984)CrossRef
24.
go back to reference Wang, J.A., Wang, H., Guo, M., Xia, M.: Security metrics for software systems. In: Proceedings of the 47th Annual Southeast Regional Conference, no. 47, pp. 1–6 (2009) Wang, J.A., Wang, H., Guo, M., Xia, M.: Security metrics for software systems. In: Proceedings of the 47th Annual Southeast Regional Conference, no. 47, pp. 1–6 (2009)
Metadata
Title
CodeTrust
Authors
Christian Damsgaard Jensen
Michael Bøndergaard Nielsen
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-95276-5_5

Premium Partner