My experience on my daily works... helping others ease each other

Showing posts with label Software Security. Show all posts
Showing posts with label Software Security. Show all posts

Thursday, March 27, 2025

Secure By Design: Security in Mind

 



Introduction

Imagine this: You’ve just finished building your dream house. It’s beautiful, modern, everything you’ve ever wanted. But then, as you’re about to move in, you realize — oh no, there are no locks on the doors. Now, instead of enjoying your new home, you’re stuck trying to retrofit security into something that wasn’t designed with it in mind.

Sounds crazy, right? Well, guess what — that’s exactly how a lot of software gets built today. We focus so much on making things work and look good that we forget to lock the doors. And when bad guys come knocking (and trust me, they will), we’re left scrambling to fix the mess.

This is something I’ve thought about a lot. With my background in IT and software security — yep, I even have a Master’s degree in it — I’ve spent years studying how vulnerabilities happen and how we can stop them before they cause trouble. What I’ve learned is simple: Security isn’t something you tack on at the end. It’s something you build in from the start.


The Evolution of Secure Software Development

Let’s rewind a bit. Back in the early 2000s, Microsoft was getting hammered for all the security flaws in its products. People were frustrated, and Microsoft knew they had to do something. So, Bill Gates sent out a memo to his teams saying, “Hey, from now on, trustworthy computing is our top priority.” That memo led to the creation of the Security Development Lifecycle (SDL) — a process that made security a core part of every step of software development.

And guess what? It worked. Over time, Microsoft not only reduced the number of vulnerabilities in its products but also set a new standard for secure software development. Even Linux, which has always been seen as super secure, struggled to keep up. The lesson here? If you bake security into your process from the beginning, you save yourself a ton of headaches later.


Modern Approaches to Security in Development

So, how do we make sure security is part of the process? Let me break it down for you.

1. The Three Pillars of Software Security

There are three main ways we test software for vulnerabilities:

Static Analysis: This is like proofreading your code before it goes live. You check for mistakes while the code is still sitting there, untouched.
Dynamic Analysis: This happens when the code is running. It’s like watching someone use your app in real-time and seeing if anything breaks or looks suspicious.
Hybrid Analysis: This combines the best of both worlds — static and dynamic testing — to give you a complete picture of your software’s security.

But tools alone won’t cut it. What really matters is the mindset. When you’re writing code, you need to think, “How could someone misuse this?” That’s what we call Secure by Design—building security into the DNA of your software.

2. SecDevOps: Making Security Everyone’s Job

Now, let’s talk about DevOps. If you’re not familiar with it, don’t worry — it’s just a fancy way of saying, “We’re going to build, test, and release software faster.” But here’s the problem: In traditional DevOps, security often gets left behind. Developers are racing to push features out the door, and security becomes an afterthought.

That’s why we have DevSecOps— where security is integrated into the DevOps process. Some people even prefer the term SecDevOps, which flips the order to show that security comes first. I like this idea because it reminds us that security isn’t just one team’s job — it’s everyone’s responsibility.

To make this work, we focus on two key practices, on top of CI/CD:

Continuous Testing: Running security checks at every stage of development, not just at the end.
Continuous Security: Keeping an eye on security throughout the entire lifecycle of the software.

By shifting security “left” (earlier in the process), we catch problems before they become big, expensive disasters.


Balancing Security and Business Demands

Here’s the tricky part: Developers are under pressure to deliver features fast. Businesses want results yesterday. But if we rush too much, we risk leaving the doors wide open for attackers. So, how do we find the balance?

It comes down to risk management. Instead of trying to fix every single issue, we focus on the biggest risks first. For example, if a vulnerability could expose customer data, that’s a top priority. If it’s something minor, maybe we can address it later.

The goal is to move fast without breaking things. Security shouldn’t slow you down — it should help you go faster by preventing costly mistakes.


Conclusion: Secure First, Deploy Smart

Here’s the bottom line: Security isn’t something you can slap on at the end — it has to be built in from the start. Whether your team is using Agile methodologies, adopting SecDevOps, leveraging program analysis tools, or following frameworks like Microsoft’s Security Development Lifecycle (SDL), the key is simple: Ensure it’s secure by design.

Think of it this way — no matter what tools or processes you use, they’re only as effective as the mindset behind them. If security is treated as an afterthought, even the best tools won’t save you. But if you embed security into every step of your process — whether you’re writing code, running tests, or deploying features—you’re setting yourself up for success.

So, here’s my challenge to you: How is your organization ensuring Secure by Design? Are you integrating it into your Agile sprints? Are you shifting security left in your SecDevOps pipeline? Or are you relying on static and dynamic analysis to catch vulnerabilities early? Whatever your approach, the goal is the same: Build software that’s secure from the ground up.

Because when it comes to security, we’re all in this together.

#CyberSecurity #SecureByDesign #DevSecOps #SecDevOps #SoftwareDevelopment #RiskManagement

Share:

Sunday, April 26, 2020

Improving your Telegram Security


Telegram’s user continues to increase and recently it reaches 400 million user per month
Since its birth, there are many features added plus friendly API allowing various innovative ideas add-in to its base. 



But, having lots of features may also result in lots of possibilities for hacking. One of the many features that may be wrongly used is the Automatic Media Download. 

As noob @ beginner, many do not realize it until their phone or PC slow due to disk space has shrunk as telegram keeps on automatically download all files. 

The most scarier is that the auto-play anything including GIF, video, and audio. All this can be used by hackers to insert a code and inject it upon executed/run by telegram.

However, luckily telegram allow us to modify the setting. Here are the steps to change it:
  1. Go to your telegram setting and choose Advance
Telegram setting window
2. At the Advance screen, go to Automatic media download section
In the Advance setting
3. Click In private chats
In automatic media download setting
4. In the setting, click all the slide-tick to disable it (or you can choose whichever you want to enable or disable). You can even reduce the size to increase the protection rate.

5. Continue the process for all settings within the Automatic media download section.



That’s all.. you are ready to go and you shall be safe.
Share:

Thursday, April 2, 2020

Ontology Model for C Overflow Vulnerabilities Attack

Prepared the slide and was hoping to present at a conference. Unfortunately, due to Covid-19, it can only be shared online here.

I would like to thank all in the slide for making it through especially Saiful who give it all to complete the paper and published it at IJATCSE.

You may access and view the slide at Slideshare


#covid19 #overflow #softwaresecurity #overflowvulnerabilities #programanalysis #staticanalysis #informationsecurity #security #cybersecurity
Share:

Monday, September 16, 2019

Securing eWallet and eTicket Apps

Last year, I was requested to do a research on Blockchain and looking for ways to implement it here. At that time, due to limited resources, I just spend a few days to do the research and thought of a few applications based on the Blockchain.

Two of them are eWallet and eTicket. Out of many, I found Aventus is one of the key company doing it. Today, they have released another feature of their product. Check it out here.

Of course, the implementation of it won't be easy. Unless you do understand how blockchain works.
Check it out at CNET to get a brief on how it works.

Image result for blockchain

Share:

Tuesday, October 31, 2017

Best Hacking e-books 2017

1.Metasploit The Penetration Tester's Guide 
https://www.up-4ever.com/591f0cz49n7d

2.A Beginners Guide To Hacking Computer Systems 
https://www.up-4ever.com/idwc4g1ag2ob

3.Black Book of Viruses and Hacking 
https://www.up-4ever.com/niv9ibml1voe

4.Hackers High School 13 Complete Hacking Ebooks 
https://www.up-4ever.com/82dzt2rjcpy3

5.Reverse Engineering Hacking and Cracking 
https://www.up-4ever.com/b2fgqs7cxw9a

6.Computer Hacking 
https://www.up-4ever.com/tuaz42q7dh0y

7.Blind SQL Injection Discovery & Exploitation 
https://www.up-4ever.com/83i3791x8gc5

8.Hacking With Experts  Facebook Hacking)Size:3mp 
https://www.up-4ever.com/ruph352nrxcl

9.Computer Hacking & Malware Attacks for Dummies 
https://www.up-4ever.com/xgcvoxuc6y76

10.stealing network 
https://www.up-4ever.com/96r86k3dg2yy

11.secrets of super hacker 
https://www.up-4ever.com/kifr8kytmfz9

12.501 websites secrets 
https://www.up-4ever.com/zqpne3e4s2cy

13.google dangerous searching 
https://www.up-4ever.com/en6dihqmf3lm

14.hacking gmail 
https://www.up-4ever.com/v2oxzy02sgm8

15.computer viruses 
https://www.up-4ever.com/gib7ecozp8yg

16.google apps hacks 
https://www.up-4ever.com/cxokzthwn6rh

17.gray hat hacking 
https://www.up-4ever.com/s5e7c3jif0kn

18.webapp hacker hand book 
https://www.up-4ever.com/85y1mqe8qgar

19.denial of service 
https://www.up-4ever.com/dfpwh6a3uw4y

20.Vulnerability Exploit & website Hacking for Dummies 
https://www.up-4ever.com/9hxraizlp8zq

21.Internet Advanced Denial of Service (DDOS) Attack 
https://www.up-4ever.com/gyf271w4gwbo

22.Beginning Ethical Hacking with Python.pdf       
http://gsurl.in/4Laz

23.Certified Ethical Hacker (CEH) Foundation Guide.pdf 
http://gsurl.in/4Lbj

24.Game Hacking.pdf
http://gsurl.in/4Lbt

25.Hacking Android.pdf 
http://gsurl.in/4LbB

The link listed above is valid as of 30th October 2017
Share:

Tuesday, December 20, 2016

json_decode(file_get_contents("php://input") on https

When you try to run json_decode on https, it will throw errors due to null value. file_get_contents("php://input") will also return null.

Way to solve it and the most efficient are as follows

//get data from caller
$arrContextOptions=array(
 "ssl"=>array(
"verify_peer"=>false,
"verify_peer_name"=>false,
),
);  
$your_data_array= json_decode(file_get_contents("php://input",false, stream_context_create($arrContextOptions)),true);

The code actually make it don't care what protocol you are using and set it to false (means no verifications). It normally happen when you are using self-signed or non-standard SSL certificates.

It is the most efficient and the fastest solutions.. but not the most practical :)

The best is -> use standard approved certificates :)
Share:

Thursday, January 14, 2016

Top Journal and Conferences based on H-Index - As of Jan 2016

Top publications - Computer Security & Cryptography based on Google Scholar

 Learn more
Publicationh5-indexh5-median
1.IEEE Symposium on Security and Privacy58103
2.ACM Symposium on Computer and Communications Security5887
3.IEEE Transactions on Information Forensics and Security5577
4.USENIX Conference on Security5082
5.Conference on Advances in cryptology4979
6.Annual International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT)4893
7.IEEE Transactions on Dependable and Secure Computing4872
8.Network and Distributed System Security Symposium (NDSS)4476
9.arXiv Cryptography and Security (cs.CR)3651
10.International Conference on The Theory and Application of Cryptology and Information Security (ASIACRYPT)3558
11.Workshop on Cryptographic Hardware and Embedded Systems (CHES)3451
12.Theory of Cryptography3353
13.Computers & Security3158
14.International Conference on Practice and Theory in Public Key Cryptography3150
15.Computer Security Applications Conference3145
16.Journal of Cryptology2956
17.International Conference on Financial Cryptography and Data Security2953
18.ACM Symposium on Information, Computer and Communications Security2759
19.International Conference on Topics in Cryptology2737
20.IEEE Computer Security Foundations Symposium2642


Top Crypto and Security Conferences Ranking (2015) by Jianying Zhou
Conference
CIF [2015]
AR
PR
CR [2015]
1.      IEEE S&P
3.83
12.2%  (35.7 / 292.7)   [2006-2015]
9.2%    (35.7 / 388.7)  [2005-2015]
4.7%
2.      Usenix Sec
3.40
16.1%  (38.4 / 239.1)   [2006-2015]
8.1%    (38.4 / 476.4)  [2006-2015]
5.2%
3.      Eurocrypt
2.92
20.3%  (37.1 / 182.8)   [2006-2015]
9.9%    (37.1 / 374.7)  [2006-2015]
4.1%
4.      Crypto
2.63
21.1%  (46.1 / 218.1)   [2006-2015]
12%     (46.1 / 385.6)  [2006-2015]
4.9%
5.      NDSS
2.40
17.1%  (34.4 / 201.6)   [2007-2015]
20.8%  (32.4 / 155.6)  [2007-2015]
3.7%
6.      ACM CCS
2.36
18.4%  (78.4 / 427.1)   [2007-2015]
15.6%  (78.4 / 503)     [2007-2015]
8.3%
7.      CHES
2.35
25.6%  (30.7 / 120)      [2006-2015]
9.2%    (30.7 / 333.8)  [2006-2015]
7.7%
8.      Asiacrypt
2.25
16.9%  (42.8 / 253.2)   [2006-2015]
19.1%  (42.8 / 224.6)  [2006-2015]
8.5%
9.      PETS
2.16
22.9%  (16.6 / 72.5)     [2006-2015]
14.1%  (16.6 / 117.9)  [2006-2015]
9.4%
10.    ACSAC
1.94
21.1%  (41.7 / 197.3)   [2006-2015]
18%     (41.7 / 232.2)  [2006-2015]
12.4%
11.    RAID
1.90
24.6%  (20.5 / 83.2)     [2006-2015]
17.8%  (20.5 / 115.3)  [2006-2015]
10.2%
12.    FSE
1.75
30%     (26.7 / 88.9)     [2006-2015]
17%     (26.7 / 156.7)  [2006-2015]
10.2%
13.    DIMVA
1.71
28.2%  (13.4 / 47.6)     [2006-2015]
16.3%  (13.4 / 82.1)    [2006-2015]
14%
14.    IEEE/IFIP DSN
1.64
22.8%  (56.7 / 248.2)   [2006-2015]
24.1%  (56.7 / 235.2)  [2006-2015]
14%
15.    IEEE CSF
1.637
26.3%  (24.5 / 93.2)     [2006-2015]
26.5%  (24.5 / 92.5)    [2006-2015]
8.3%
16.    CT-RSA
1.57
28.7%  (25.5 / 88.8)     [2006-2015]
25%     (25.5 / 102.1)  [2006-2015]
10%
17.    PKC
1.53
26.3%  (32.1 / 122)      [2006-2015]
28.7%  (32.1 / 112)     [2006-2015]
10.3%
18.    TCC
1.48
32.9%  (35 / 106.3)      [2006-2015]
26.9%  (35 / 130.1)     [2006-2015]
7.8%
19.    ACNS
1.44
18.4%  (32.3 / 175.5)   [2006-2015]
37.1%  (32.3 / 87)       [2006-2015] 
20.    ESORICS
1.439
21%     (43.8 / 208.5)   [2006-2015]
34.4% (43.8 / 127.3)   [2006-2015]
14.1%
21.    ACM WiSec
1.39
26.7%  (23.4 / 87.6)     [2008-2015]
30.4%  (23.4 / 76.9)    [2008-2015]
14.6%
22.    FC
1.31
28.1%  (27.3 / 97.3)     [2006-2015]
30.1%  (27.3 / 90.6)    [2006-2015]
18.3%
23.    SAC
1.25
27.3%  (25.5 / 93.3)     [2008-2015]
38.7%  (25.5 / 65.9)    [2008-2015]
14.3%
24.    IFIP Sec
1.21
26.5%  (36 / 135.8)      [2010-2015]
29.5%  (36 / 122)        [2010-2015]
26.5%
25.    ACISP
1.06
30.9%  (30.4 / 98.4)     [2008-2015]
44.6%  (30.4 / 68.1)    [2008-2015]
18.6%
26.    ISC
1.05
28.7%  (31.7 / 110.6)   [2006-2015]
48.1%  (31.7 / 65.9)    [2006-2015]
18.2%

Other link for journal and conference ranking


  1. SCImago Journal and Country Rank
  2. Microsoft Academic Research
  3. Mark Stamp (personal)
  4. Guofei Gu (personal)
  5. Google Scholar

Information on Open Access Journal

1. http://scholarlyoa.com/
Share:

About Me

Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography

Labels

Blog Archive

Blogger templates