McGraw Hill - 19 Deadly Sins of Software Security  


19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
by Michael Howard, David LeBlanc and John Viega
McGraw-Hill/Osborne Publication
ebook format: CHM
ISBN-10:0072260858

I read six books on software security recently, namely “Writing Secure Code, 2nd Ed” by Michael Howard and David LeBlanc; “19 Deadly Sins of Software Security” by Michael Howard, David LeBlanc, and John Viega; “Software Security” by Gary McGraw; “The Security Development Lifecycle” by Michael Howard and Steve Lipner; “High-Assurance Design” by Cliff Berg; and “Security Patterns” by Markus Schumacher, et al. Each book takes a different approach to the software security problem, although the first two focus on coding bugs and flaws; the second two examine development processes; and the last two discuss practices or patterns for improved design and implementation. My favorite of the six is Gary McGraw’s, thanks to his clear thinking and logical analysis. The other five are still noteworthy books. All six will contribute to the
production of more security software.

The main reason to read 19DS is to quickly become acquainted with various security problems facing software developers. At less than 300 pages, it’s not a thick tome like WSC2E. 19DS also is not afraid to mix bugs (coding errors, like buffer overflow conditions) with flaws (design problems, like “failing to protect network traffic.”) This sort of lax categorization bothers me (and Gary McGraw, as noted in his book “Software Security”), but it shouldn’t interfere with the quality content of 19DS.

Probably the most interesting aspect (to me) of 19DS was sin 10, which discussed problems with Secure Sockets Layer (SSL). The chapter didn’t describe algorithmic or protocol problems. Instead, it explained how programmers make poor assumptions about the features provided by their language of choice with respect to SSL. For example, many SSL libraries do not properly validate certificates. Without this functionality, the authors argue that SSL is almost worthless. While I don’t necessarily agree with this statement, I really like reading this sort of criticism. I’d like to note that p 134 berates Python’s ssl() but ignores pyOpenSSL, which probably provides the features the authors would want.

Other “sins” take slightly different looks at security issues. Sin 17, for example, explains the importance of key exchange AND authentication. These are the sorts of problems I imagine are only discovered by examining multiple real-world implementations, and I value the authors sharing their experiences.

I subtracted one star because the quality of the “sins” isn’t even. Some don’t adequately explain the problem at hand (e.g., integer overflows). If the authors assume the reader knows the problem well enough to not introduce it properly, then why discuss it at all?

Overall, however, 19DS is a great book to get to your developers. It’s short enough that they might actually read it, and the content is presented in a convincing enough manner to perhaps influence their coding choices.

Download link

AddThis Social Bookmark Button

0 comments

Post a Comment

Enter your email address:

About this blog