• No results found

Master Thesis – Secure coding in practice

N/A
N/A
Protected

Academic year: 2021

Share "Master Thesis – Secure coding in practice"

Copied!
1
0
0

Loading.... (view fulltext now)

Full text

(1)

Contact Persons

Robert Gavel Magnus Öberg

+46 10 711 49 94 +46 10 711 59 68

robert.gavel@ericsson.com magnus.y.oberg@ericsson.com

Master Thesis – Secure coding in practice

Background

Today, security is a necessary part of most software development projects. Especially when building products used in critical infrastructure. It is becoming a standard practice for buyers of software based products to require that vendors can give an account of what assurance have been performed to make sure that security aspects have been properly considered during the development of a product.

Ericsson has incorporated security assurance in its development processes and works systematically to improve and extend them. One area of security assurance is Secure Coding where the aim is to avoid that coding mistakes, that might cause a security vulnerability, can remain undetected, or that they are made in the first place.

Thesis Description

This master thesis project will, in close cooperation with development teams, investigate how we at Ericsson can improve our existing Secure Coding practices.

The project includes a theoretical part that should provide a good overview of the existing state of the art with respect to Secure Coding, covering both ways of working and supporting tools. A practical part of the project involves evaluating, in close collaboration with a development team, the impacts of introducing new tools in the process. Interesting questions here are; which is the initial effort, how easy is the tool to use, and how effective is the tool in detecting potential problems.

The thesis will be concluded with a result presentation for relevant groups within Ericsson.

Qualifications

This project aims at students in electrical engineering, computer science, computer engineering or similar.

Background in information security is preferred.

Extent

1-2 students, 30hp each

Location

Ericsson AB Mjärdevi, Linköping

Preferred Starting Date

Spring 2018

Keywords

Secure Coding, Information Security

References

Related documents

By quickly switching between sector coverage with MIMO activated and omni-coverage with a SISO configuration, whenever there is no need for high data rates, we can utilize only

We would like to thank many people that have contributed to this research. Without them, it would not have been possible to achieve this research. First of all, we would like to

They assisted the top management in aligning human resource polices and quality policies, creating and communicating the total quality management concept, preparing the

Contrary to the statement of H3 - “Content with mixed communication cues will have more consumer responses than content with informational or emotional cues,” our study finds

It also integrated with other national sites like www.baomoi.com, www.i4vn.com.vn … and famous international portals like www.youtube.com, www.wikipedia.com,

Keywords: Self-Adaptive Systems, Self-Adaptation, Architecture-Based Adap- tation, Autonomous Systems, Cyber-Physical Systems, CPS, DeltaIoT, IoT, ActivFORMS, MAPE-K Feedback

In Figure 27b the SPT DBM portrays no such lake floor features, with the elevation being smoother (Fig. Since the upper z value can be limited to the set lake level

Comment: this particular component part was removed from the second draft of the program, which was made after one year program had already started (Swedish Agency for Economic and