Val Kozarev’s research while affiliated with North Carolina State University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard
  • Conference Paper

May 2021

·

40 Reads

·

15 Citations

Sarah E. Elder

·

·

Val Kozarev

·

[...]

·

Laurie Williams

Fig. 4. Exploratory Penetration Testing Efficiency 41
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard
  • Preprint
  • File available

March 2021

·

310 Reads

Lack of security expertise among software practitioners is a problem with many implications. First, there is a deficit of security professionals to meet current needs. Additionally, even practitioners who do not plan to work in security may benefit from increased understanding of security. The goal of this paper is to aid software engineering educators in designing a comprehensive software security course by sharing an experience running a software security course for the eleventh time. Through all the eleven years of running the software security course, the course objectives have been comprehensive - ranging from security testing, to secure design and coding, to security requirements to security risk management. For the first time in this eleventh year, a theme of the course assignments was to map vulnerability discovery to the security controls of the Open Web Application Security Project (OWASP) Application Security Verification Standard (ASVS). Based upon student performance on a final exploratory penetration testing project, this mapping may have increased students' depth of understanding of a wider range of security topics. The students efficiently detected 191 unique and verified vulnerabilities of 28 different Common Weakness Enumeration (CWE) types during a three-hour period in the OpenMRS project, an electronic health record application in active use.

Download

Citations (1)


... [47], which comprises 286 VRs designed to secure systems. The ASVS is acknowledged as an authoritative global industry benchmark for application security and is embraced by a host of organizations (e.g., Booz Allen Hamilton 1 and CGI Federal 2 ), academic researchers [36,59], and educators [13]. ...

Reference:

Incorporating Verification Standards for Security Requirements Generation from Functional Specifications
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard
  • Citing Conference Paper
  • May 2021