This is a work of the U.S. Government and is not subject to copyright protection in the United States. The OWASP Foundation OWASP AppSec DC October 2005.

Slides:



Advertisements
Similar presentations
Software Assurance Metrics and Tool Evaluation (SAMATE) Michael Kass National Institute of Standards and Technology
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Static Technique. Static Technique - Review  A way of testing software work products  Program code, requirement spec., design spec.  Test plan, test.
Testing Without Executing the Code Pavlina Koleva Junior QA Engineer WinCore Telerik QA Academy Telerik QA Academy.
Stepan Potiyenko ISS Sr.SW Developer.
Overview Lesson 10,11 - Software Quality Assurance
Copyright © 2006 Software Quality Research Laboratory DANSE Software Quality Assurance Tom Swain Software Quality Research Laboratory University of Tennessee.
SE 555 Software Requirements & Specification Requirements Validation.
1 Software Testing and Quality Assurance Lecture 1 Software Verification & Validation.
Vulnerability Assessments
This is a work of the U.S. Government and is not subject to copyright protection in the United States. The OWASP Foundation OWASP AppSec DC October 2005.
Network security policy: best practices
Slide 1 Test Assurance – Ensuring Stakeholders get What They Want Paul Gerrard Gerrard Consulting PO Box 347 Maidenhead Berkshire SL6 2GU UK e:
Introduction to Network Defense
Planning for SATE V Paul E. Black National Institute of Standards and Technology
Picture 1 model: ICT lifecycle in a company 1. business needs & business strategy 2. ICT strategy - ICT assessment - ICT strategic plan - ICT implementation/tactical.
Chapter 16 Software Quality Assurance
PV213 EIS in Practice: 04 – Quality assurance1 PV213 Enterprise Information Systems in Practice 04 – Quality assurance.
Chapter 16 Software Quality Assurance
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
S T A M © 2000, KPA Ltd. Software Trouble Assessment Matrix Software Trouble Assessment Matrix *This presentation is extracted from SOFTWARE PROCESS QUALITY:
Software Quality Chapter Software Quality  How can you tell if software has high quality?  How can we measure the quality of software?  How.
Verification and Validation Yonsei University 2 nd Semester, 2014 Sanghyun Park.
CSCE 548 Secure Software Development Risk-Based Security Testing.
Information Systems Security Computer System Life Cycle Security.
A Framework for Automated Web Application Security Evaluation
Software Quality Assurance Activities
Unit 8 Syllabus Quality Management : Quality concepts, Software quality assurance, Software Reviews, Formal technical reviews, Statistical Software quality.
CSCE 548 Code Review. CSCE Farkas2 Reading This lecture: – McGraw: Chapter 4 – Recommended: Best Practices for Peer Code Review,
Chapter 6 : Software Metrics
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Vulnerability and Adaptation Methods and Tools. NATIONAL LOCAL INTEGRATED / DYNAMIC SECTORAL / STATIC GLOBAL GIS temporal Indicator analysis and ranking.
Software Quality Assurance SE Software Quality Assurance What is “quality”?
EMI INFSO-RI SA2 - Quality Assurance Alberto Aimar (CERN) SA2 Leader EMI First EC Review 22 June 2011, Brussels.
11111 Benchmarking in KW. Sep 10th, 2004 © R. García-Castro, A. Gómez-Pérez Raúl García-Castro, Asunción Gómez-Pérez September 10th, 2004 Benchmarking.
Software Project Management Lecture # 10. Outline Quality Management (chapter 26)  What is quality?  Meaning of Quality in Various Context  Some quality.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
Lecture 7: Requirements Engineering
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CSCE 522 Secure Software Development Best Practices.
The Development of BPR Pertemuan 6 Matakuliah: M0734-Business Process Reenginering Tahun: 2010.
For ABA Importance of Individual Subjects Enables applied behavior analysts to discover and refine effective interventions for socially significant behaviors.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
This is a work of the U.S. Government and is not subject to copyright protection in the United States. The OWASP Foundation OWASP AppSec DC October 2005.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Distributed Accounting Working Group (DAWG) Distributed Accounting Models Research Group Monday, 22 July 2002 Tuesday, 23 July 2002 Edinburgh, Scotland.
NIST SAMATE Project and OMG Michael Kass NIST Information Technology Laboratory March 11, 2008.
SwA Co-Chair and Task Lead Strategy Session Agenda Technology, Tools and Product Evaluation Working Group Status Briefing Co-Chair(s) Michael Kass (NIST),
1 Lecture 12: Chapter 16 Software Quality Assurance Slide Set to accompany Software Engineering: A Practitioner’s Approach, 7/e by Roger S. Pressman Slides.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
T EST T OOLS U NIT VI This unit contains the overview of the test tools. Also prerequisites for applying these tools, tools selection and implementation.
What is a software? Computer Software, or just Software, is the collection of computer programs and related data that provide the instructions telling.
Assessing Logistics System Supply Chain Management 1.
Brian Alpert July 14, 2010 Leveraging Web Analytics and Search Engine Optimization (SEO) Project Workshop.
by: Er. Manu Bansal Deptt of IT Software Quality Assurance.
Verification vs. Validation Verification: "Are we building the product right?" The software should conform to its specification.The software should conform.
Software Engineering Lecture 11 Software Testing Presenter: Josef Hallberg 1.
Laurea Triennale in Informatica – Corso di Ingegneria del Software I – A.A. 2006/2007 Andrea Polini XVII. Verification and Validation.
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
Software Quality Control and Quality Assurance: Introduction
CSCE 548 Secure Software Development Risk-Based Security Testing
Software Engineering (CSI 321)
CSC 480 Software Engineering
Verification and Validation
Chapter 21 Software Quality Assurance
Chapter 21 Software Quality Assurance
Presentation transcript:

This is a work of the U.S. Government and is not subject to copyright protection in the United States. The OWASP Foundation OWASP AppSec DC October The Software Assurance Metrics and Tool Evaluation (SAMATE) Project Paul E. Black Computer Scientist, NIST

OWASP AppSec DC Outline  Overview of the NIST SAMATE project  Purposes of tool and technique evaluation  Software and effectiveness metrics  Report of workshop on Defining the State of the Art in Software Security Tools  Final comments

OWASP AppSec DC The NIST SAMATE Project  Surveys  Tools  Researchers and companies  Workshops & conference sessions  Taxonomy of software assurance (SwA) functions & techniques  Order of importance (cost/benefit, criticalities, …)  Gaps and research agendas  Studies to develop metrics  Enable tool evaluations  Write detailed specification  Develop test plans and reference material  Collect tool evaluations, case studies, and comparisons

OWASP AppSec DC Taxonomy of SwA Tool Functions and Techniques  Concept or business need  Use cases  Changes to current systems  Requirements and design  Consistency  Completeness  Compliance  Implementation  The usual …  Assessment and acceptance  External  Automated vulnerability scanners  Penetration test assistants  Other standard testing techniques: usage, spec-based, statistical, worst-case/criticality, etc.  Insider  Automated code scanners –Syntactic, e.g., “grep” –Semantic  Code review assistants –Source code –Virtual Machine code (e.g., Java bytecode or.Net intermediate code) –Binary (debugger, decompiler)  Operation  Operator training  Auditing  Penetration test

OWASP AppSec DC Planned Workshops  Enumerate SwA functions and techniques  Approach (code vs. spec, static vs. dynamic)  Software type (distributed, real time, secure)  Type of fault detected  Recruit focus groups  Which are the most “important”?  Highest cost/benefit ratio?  Finds highest priority vulnerabilities?  Most widely used?  Critique reference dataset  Identify gaps in functions and recommend research  Plan and initiate studies for metrics

OWASP AppSec DC Outline  Overview of the NIST SAMATE project  Purposes of tool and technique evaluation  Software and effectiveness metrics  Report of workshop on Defining the State of the Art in Software Security Tools  Final comments

OWASP AppSec DC Purposes of Tool or Technique Evaluations  Precisely document what a tool does (and doesn’t) do … in order to …  Provide feedback to tool developers  Simple changes to make  Directions for future releases  Inform users  Match the tool or technique to a particular situation  Understand significance of tool results  Know how techniques work together

OWASP AppSec DC Developing a Specification  After a technique or tool function is selected by the working group …  NIST and focus group develops a clear, testable specification  Specification posted for public comment  Comments incorporated  Develop a measurement methodology:  Test cases  Procedures  Reference implementations and data  Scripts and auxiliary programs  Interpretation criteria

Workshop1 SwA classes Workshop 3 metrics studies Workshop 2 research gaps focus group class 1 focus group class 1 Function Taxonomy Tool Survey Publication strawman spec test plan draft Spec0 Spec1 select func strawman spec draft Spec0 Spec1 SAMATE Project Timeline focus group class 2 focus group class 2 tool testing matrix select func

OWASP AppSec DC Why Look at Checking First?  Vital for software developed outside, i.e., when process is not visible  Applicable to legacy software  Feedback for process improvement  Process experiments are expensive  Many are working on process (SEI, PSP, etc.)

OWASP AppSec DC Outline  Overview of the NIST SAMATE project  Purposes of tool and technique evaluation  Software and effectiveness metrics  Report of workshop on Defining the State of the Art in Software Security Tools  Final comments

OWASP AppSec DC But, is the tool or methodology effective?  Is this program secure (enough)?  How secure does tool X make a program?  How much more secure does technique X make a program after techniques Y and Z ?  Do they really find or prevent bugs and vulnerabilities?  Dollar for dollar, does methodology P or S give more reliability?

OWASP AppSec DC Toward Software Metrics  Qualitative comparison  Formally defined quantity  Unit and scale  Measured value  Derived units warmer, colderbuggy, secure temperaturequality? confidence? degree, Kelvin ? Heat energy=smt Software assurance  pt

OWASP AppSec DC Benefits of SAMATE Project  Define metrics for evaluating SwA tools  Users can make more informed tool choices  Neutral test program  Tool creators make better tools

OWASP AppSec DC Outline  Overview of the NIST SAMATE project  Purposes of tool and technique evaluation  Software and effectiveness metrics  Report of workshop on Defining the State of the Art in Software Security Tools  Final comments

OWASP AppSec DC Workshop on Defining the State of the Art in Software Security Tools  Workshop Characteristics  NIST, Gaithersburg  10 & 11 August 2005   45 people from government, universities, vendors and service providers, and research companies came  Proceedings, including discussion notes and submitted material, should be available from above URL when you see this.  Goals  Understand the state of the art of software security assurance tools in detecting security flaws and vulnerabilities.  Discuss metrics to evaluate the effectiveness of such tools.  Collect flawed and “clean” software for a reference dataset.  Publish a report on classes of software security vulnerabilities.

OWASP AppSec DC Outcomes of Workshop I  Understand the state of the art of software security assurance tools in detecting security flaws and vulnerabilities.  A report is being written.  Discuss metrics to evaluate the tool effectiveness  All agreed that software metrics and tool effectiveness metrics are a good idea.  No consensus on how to approach the challenge.

OWASP AppSec DC Outcomes of Workshop II  Collect flawed and “clean” software to be a reference.  Several collections emerged: MIT, Fortify, etc.  Attendees agreed that a shared reference dataset would help.  NIST reference dataset in development.  Prototype available at (URL forthcoming)  Report on classes of software security vulnerabilities  Discussed several existing flaw taxonomies: Clasp, PLOVER (CVE), etc.  Attendees agreed a common taxonomy would help.  Discussions continuing on samate list.

OWASP AppSec DC Outline  Overview of the NIST SAMATE project  Purposes of tool and technique evaluation  Software and effectiveness metrics  Report of workshop on Defining the State of the Art in Software Security Tools  Final comments

OWASP AppSec DC Society has 3 options:  Learn how to make software that works  Limit size or authority of software  Accept failing software

OWASP AppSec DC Contact to Participate  Paul E. Black Project Leader Software Diagnostics & Conformance Testing Division, Software Quality Group, Information Technology Laboratory, NIST