Towards cooperative games for developing secure software in agile SDLC

Mithun Vaidhyanathan, Weisheng Si, Bahman Javadi, Seyit Camtepe

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

Abstract

![CDATA[This work applies Game Theory to developing secure software. With the perspective of Game Theory, one can see secure software development as a game between software developers and software security engineers, who play this game repeatedly in processes such as agile Software Development Life Cycle (SDLC). The problem we observe is that there can be conflicts between these two players regarding who should find and fix certain software vulnerabilities. To solve this problem, our approach uses Mechanism Design in Game Theory to design games that enforce cooperation between these two players. In doing so, we identify the source of the conflicts between them by looking at the components of the software. These components may be the methods or functions in the software, or individual modules, or similar building blocks. The novelty of our work is that our mechanism constructs a game which allocates software components between these two players such that they work cooperatively while trying to maximize their own payoffs.]]
Original languageEnglish
Title of host publicationProceedings of the IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2022), 7-9 December 2022, Taichung, Taiwan
PublisherIEEE
Pages61-68
Number of pages8
DOIs
Publication statusPublished - 2022
EventIEEE/ACIS International Conference on Software Engineering_Artificial Intelligence_Networking and Parallel/Distributed Computing -
Duration: 7 Dec 2022 → …

Conference

ConferenceIEEE/ACIS International Conference on Software Engineering_Artificial Intelligence_Networking and Parallel/Distributed Computing
Period7/12/22 → …

Fingerprint

Dive into the research topics of 'Towards cooperative games for developing secure software in agile SDLC'. Together they form a unique fingerprint.

Cite this