applsci-logo

Journal Browser

Journal Browser

Advances in Software Development and Security Design

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (20 July 2023) | Viewed by 2619

Special Issue Editors


E-Mail Website
Guest Editor
Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh 11451, Saudi Arabia
Interests: software engineering; software optimization; intelligent computing; cybersecurity and applications

E-Mail Website
Guest Editor
Faculty of Computers and Information Technology, University of Tabuk, Tabuk 47512, Saudi Arabia
Interests: artificial intelligence; software engineering and cybersecurity

Special Issue Information

Dear Colleagues,

Nowadays, with the increasing number of hacking attacks and cybercrimes in software systems, security has become a priority throughout the software development lifecycle (SDLC). Security design must be taken into account during the testing phase. Additionally, incorporating security principles into all software development processes can detect and fix potential security risks at an early stage. Additionally, continuous analysis of software architecture throughout the design phase can enhance the testing process of security software. Some SDLC methodologies, such as Agile, perform testing at every stage of the SDLC, and this should include aspects of security software testing. Since the goal of secure software is to deal with zero-day vulnerabilities and hybrid attacks, trust systems must become non-existent in software engineering. The control of each component of secure systems, including software, hardware, network, and data, have to treated with a high level of security and confidentiality. This is Secure SDLC (SSDLC), that integrates security directly into the software development lifecycle. Adapting these SSDLC methodologies and enhancing security practices can result in higher secure software and lower overall risk.

In this Special Issue, we invite submissions exploring innovation and originality in software development and security design, methods, and applications. Contributions can focus on different aspects of secure software development and security design.

Dr. Mashael Maashi
Dr. Majed Aborokbah
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • secure agile software developments
  • secure software developments standards
  • cybersecurity
  • software development lifecycle (SDLS)
  • secure software development lifecycle (SSDLC)
  • security software testing

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

34 pages, 1137 KiB  
Article
MT-SOTA: A Merkle-Tree-Based Approach for Secure Software Updates over the Air in Automotive Systems
by Abir Bazzi, Adnan Shaout and Di Ma
Appl. Sci. 2023, 13(16), 9397; https://doi.org/10.3390/app13169397 - 18 Aug 2023
Cited by 4 | Viewed by 1905
Abstract
The automotive industry has seen a dynamic transformation from traditional hardware-defined to software-defined architecture enabling higher levels of autonomy and connectivity, better safety and security features, as well as new in-vehicle experiences and richer functions through software and ongoing updates of both functional [...] Read more.
The automotive industry has seen a dynamic transformation from traditional hardware-defined to software-defined architecture enabling higher levels of autonomy and connectivity, better safety and security features, as well as new in-vehicle experiences and richer functions through software and ongoing updates of both functional and safety-critical features. Service-oriented architecture plays a pivotal role in realizing software-defined vehicles and fostering new business models for OEMs. Such architecture evolution demands new development paradigms to address the increasing complexity of software. This is crucial to guarantee seamless software development, integration, and deployment—all the way from cloud or backend repositories to the vehicle. Additionally, it calls for enhanced collaboration between car manufacturers and suppliers. Simultaneously, it introduces challenges associated with the necessity for ongoing updates and support ensuring vehicles remain safe and up to date. Current approaches to software updates have primarily been implemented for traditional vehicle architectures, which mostly comprise specialized electronic control units (ECUs) designed for specific functions. These ECUs are programmed with a single comprehensive executable that is then flashed onto the ECU all at once. Different approaches should be considered for new software-based vehicle architectures and specifically for ECUs with multiple independent software packages. These packages should be updated independently and selectively for each ECU. Thus, we propose a new scheme for software updates based on a Merkle tree approach to cope with the complexity of the new software architecture while addressing safety and security requirements of real-time and resource-constrained embedded systems in the vehicle. The Merkle-tree-based software updates over the air (MT-SOTA) proposal enables secure updates for individual software clusters. These clusters are developed and integrated by diverse entities with varying release timelines. Our study demonstrates that the MT-SOTA scheme can enhance the speed of software update execution without significantly increasing the process overhead. Additionally, it offers necessary defense against potential cyberthreats. The results of the performed technical analysis and experiments of the MT-SOTA implementation are presented in this paper. Full article
(This article belongs to the Special Issue Advances in Software Development and Security Design)
Show Figures

Figure 1

Back to TopTop