[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/CSAC.2004.41guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The Trustworthy Computing Security Development Lifecycle

Published: 06 December 2004 Publication History

Abstract

This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs to withstand malicious attack.The process encompasses the addition of a series of security-focused activities and deliverables to each of the phases of Microsoft's software development process.These activities and deliverables include the development of threat models during software design, the use of static analysis code-scanning tools during implementation, and the conduct of code reviews and security testing during a focused "security push".Before software subject to the SDL can be released, it must undergo a Final Security Review by a team independent from its development group.When compared to software that has not been subject to the SDL, software that has undergone the SDL has experienced a significantly reduced rate of external discovery of security vulnerabilities.This paper describes the SDL and discusses experience with its implementation across a range of Microsoft software.

Cited By

View all
  • (2024)Consistency Management for Security Annotations for Continuous VerificationProceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems10.1145/3652620.3687821(1096-1105)Online publication date: 22-Sep-2024
  • (2024)“It would work for me too”: How Online Communities Shape Software Developers’ Trust in AI-Powered Code Generation ToolsACM Transactions on Interactive Intelligent Systems10.1145/365199014:2(1-39)Online publication date: 9-Mar-2024
  • (2024)Investigating and Designing for Trust in AI-powered Code Generation ToolsProceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency10.1145/3630106.3658984(1475-1493)Online publication date: 3-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSAC '04: Proceedings of the 20th Annual Computer Security Applications Conference
December 2004
434 pages
ISBN:0769522521

Publisher

IEEE Computer Society

United States

Publication History

Published: 06 December 2004

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Consistency Management for Security Annotations for Continuous VerificationProceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems10.1145/3652620.3687821(1096-1105)Online publication date: 22-Sep-2024
  • (2024)“It would work for me too”: How Online Communities Shape Software Developers’ Trust in AI-Powered Code Generation ToolsACM Transactions on Interactive Intelligent Systems10.1145/365199014:2(1-39)Online publication date: 9-Mar-2024
  • (2024)Investigating and Designing for Trust in AI-powered Code Generation ToolsProceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency10.1145/3630106.3658984(1475-1493)Online publication date: 3-Jun-2024
  • (2024)Secure software design evaluation and decision making model for ubiquitous computingComputers in Human Behavior10.1016/j.chb.2023.108109153:COnline publication date: 12-Apr-2024
  • (2024)Expediting the design and development of secure cloud-based mobile appsInternational Journal of Information Security10.1007/s10207-024-00880-623:4(3043-3064)Online publication date: 1-Aug-2024
  • (2023)SLR: From Saltzer and Schroeder to 2021…47 Years of Research on the Development and Validation of Security API RecommendationsACM Transactions on Software Engineering and Methodology10.1145/356138332:3(1-31)Online publication date: 27-Apr-2023
  • (2022)Software security during modern code review: the developer’s perspectiveProceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3540250.3549135(810-821)Online publication date: 7-Nov-2022
  • (2022)Integrating vulnerability risk into the software processProceedings of the 2022 ACM Southeast Conference10.1145/3476883.3520217(91-98)Online publication date: 18-Apr-2022
  • (2019)Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration TestingProceedings of the 14th International Conference on Availability, Reliability and Security10.1145/3339252.3341482(1-8)Online publication date: 26-Aug-2019
  • (2019)The Effect of Software Warranties on CybersecurityACM SIGSOFT Software Engineering Notes10.1145/3282517.330239843:4(31-35)Online publication date: 2-Jan-2019
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media