Integrated software vulnerability and security functionality assessment

被引:2
|
作者
Wang, Xiangrong [1 ]
Shi, Hang [1 ]
Huang, Tze-Yau William [1 ]
Lin, Frank C. [1 ]
机构
[1] Cisco Syst Inc, Automated Test Ctr, 170 W TAsman Dr, San Jose, CA 95134 USA
关键词
D O I
10.1109/ISSRE.2007.20
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Product security is an on-going challenge for network equipment vendors. In this paper, we present a systematic methodology for some software vulnerability assessment and security function verification. Based on this approach, a scalable and adaptable automatic test system was implemented to test over a hundred production software releases over the past year. This paper describes the methodology, the framework, and the results.
引用
收藏
页码:103 / +
页数:2
相关论文
共 50 条
  • [1] Software Vulnerability and Functionality Assessment using LLMs
    Jensen, Rasmus Ingemann Tuffveson
    Tawosi, Vali
    Alamir, Salwa
    PROCEEDINGS 2024 ACM/IEEE INTERNATIONAL WORKSHOP ON NL-BASED SOFTWARE ENGINEERING, NLBSE 2024, 2024, : 25 - 28
  • [2] Security Vulnerability Assessment for Software Version Upgrade
    Treetippayaruk, Sirikwan
    Senivongse, Twittie
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 283 - 289
  • [3] Vulnerability distribution scoring for software product security assessment
    Rasheed, Hassan, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06):
  • [4] Security Risk Growth Models for Software Vulnerability Assessment
    Minohara, Takashi
    Shimakawa, Masaya
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS, DSN-W, 2023, : 32 - 35
  • [5] Security Threat and Vulnerability Assessment and Measurement in Secure Software Development
    Humayun, Mamoona
    Jhanjhi, N. Z.
    Almufareh, Maram Fahhad
    Khalil, Muhammad Ibrahim
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 5039 - 5059
  • [6] Software Vulnerability and Application Security Risk
    Peng, Jianping
    Guo, Meiwen
    Quan, Jing
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2019, 32 (01) : 48 - 57
  • [7] Security simulation for vulnerability assessment
    Hennessey, Brian
    Norman, Bradley
    Wesson, Robert B.
    ENABLING TECHNOLOGIES FOR SIMULATION SCIENCE X, 2006, 6227
  • [8] Security simulation for vulnerability assessment
    Hennessey, Brian
    Wesson, Robert B.
    Norman, Bradley
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2007, 22 (09) : 11 - 16
  • [9] Security simulation for vulnerability assessment
    Hennessey, Brian
    Norman, Bradley
    Wesson, Robert B.
    2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, : 46 - +
  • [10] Research on Software Security Vulnerability Detection Technology
    Liu Ping
    Su Jin
    Yang Xinfeng
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1873 - 1876