Exploring the Connection between Design Smells and Security Vulnerabilities
Mamdouh Alenezi1, Mohammed Akour2
1Mamdouh Alenezi, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia.
2Mohammed Akour*, Al Yamamah University, Riyadh, Saudi Arabia, Yarmouk University, Irbid, Jordan.
Manuscript received on May 16, 2020. | Revised Manuscript received on May 16, 2020. | Manuscript published on June 10, 2020. | PP: 449-452 | Volume-9 Issue-8, June 2020. | Retrieval Number: H6508069820/2020©BEIESP | DOI: 10.35940/ijitee.H6508.069820
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Software quality aims at having quality as part of all aspects of the developed software. Design smells are considered enemies of the software source code quality. There are verities of design problems with different terminologies. Researchers and practitioners accept it as true that whenever there is a design smell, there is a security issue or concern. In this work, we want to explore the connection between design smells and security vulnerabilities. This work provides experimental evidence about this connection. We conducted an empirical study to explore the connection between design smells and security issues by evaluating four C# open-source systems. We found interesting results that show classes with design smells have more chances of having security issues.
Keywords: Design Smell, Empirical Study, Software Evolution.
Scope of the Article: Software Engineering Methodologies