Detection of malicious software engineer intrusion

Michael E. Shin, Nipul Patel, Snehadeep Sethia

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

This paper describes an approach to detecting malicious software engineer intrusion attacks using the business processes (use cases) of applications. The approach detects malicious codes inserted by malicious software engineers to applications during software development or maintenance. The proposed approach protects application systems from malicious codes in terms of maliciously release (confidentiality security requirement) or change of sensitive information (integrity security requirement) encapsulated in application systems.

Original languageEnglish
Title of host publicationSEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering
Pages565-570
Number of pages6
StatePublished - 2010
Event22nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2010 - Redwood City, CA, United States
Duration: Jul 1 2010Jul 3 2010

Publication series

NameSEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering

Conference

Conference22nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2010
CountryUnited States
CityRedwood City, CA
Period07/1/1007/3/10

Fingerprint Dive into the research topics of 'Detection of malicious software engineer intrusion'. Together they form a unique fingerprint.

  • Cite this

    Shin, M. E., Patel, N., & Sethia, S. (2010). Detection of malicious software engineer intrusion. In SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering (pp. 565-570). (SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering).