%0 Conference Proceedings %T Hunting for Aardvarks: Can Software Security Be Measured? %+ Information and Communication Technology [Oslo] (SINTEF - ICT) %A Jaatun, Martin, Gilje %Z Part 1: Conference %< avec comité de lecture %( Lecture Notes in Computer Science %B International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES) %C Prague, Czech Republic %Y Gerald Quirchmayr %Y Josef Basl %Y Ilsun You %Y Lida Xu %Y Edgar Weippl %I Springer %3 Multidisciplinary Research and Practice for Information Systems %V LNCS-7465 %P 85-92 %8 2012-08-20 %D 2012 %R 10.1007/978-3-642-32498-7_7 %Z Computer Science [cs]Conference papers %X When you are in charge of building software from the ground up, software security can be encouraged through the use of secure software development methodologies. However, how can you measure the security of a given piece of software that you didn’t write yourself? In other words, when looking at two executables, what does “a is more secure than b” mean? This paper examines some approaches to measuring software security, and reccommends that more organisations should employ the Building Security In Maturity Model (BSIMM). %G English %Z TC 5 %Z TC 8 %Z WG 8.4 %Z WG 8.9 %2 https://inria.hal.science/hal-01542432/document %2 https://inria.hal.science/hal-01542432/file/978-3-642-32498-7_7_Chapter.pdf %L hal-01542432 %U https://inria.hal.science/hal-01542432 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-CD-ARES %~ IFIP-WG8-4 %~ IFIP-WG8-9 %~ IFIP-LNCS-7465