Integrated software vulnerability and security functionality assessment

被引:2
|
作者
Wang, Xiangrong [1 ]
Shi, Hang [1 ]
Huang, Tze-Yau William [1 ]
Lin, Frank C. [1 ]
机构
[1] Cisco Syst Inc, Automated Test Ctr, 170 W TAsman Dr, San Jose, CA 95134 USA
关键词
D O I
10.1109/ISSRE.2007.20
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Product security is an on-going challenge for network equipment vendors. In this paper, we present a systematic methodology for some software vulnerability assessment and security function verification. Based on this approach, a scalable and adaptable automatic test system was implemented to test over a hundred production software releases over the past year. This paper describes the methodology, the framework, and the results.
引用
收藏
页码:103 / +
页数:2
相关论文
共 50 条
  • [21] An Automated Vulnerability Detection and Remediation Method for Software Security
    Jurn, Jeesoo
    Kim, Taeeun
    Kim, Hwankuk
    SUSTAINABILITY, 2018, 10 (05)
  • [22] Measuring and Modeling Software Vulnerability Security Advisory Platforms
    Miranda, Lucas
    Vieira, Daniel
    Nogueira, Mateus
    Ventura, Leonardo
    Bicudo, Miguel
    Martins, Matheus
    Senos, Lucas
    De Aguiar, Leandro P.
    Lovat, Enrico
    Menasche, Daniel
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2020), 2021, 12528 : 31 - 48
  • [23] Development of a software security assessment instrument to reduce software security risk
    Gilliam, DP
    Kelly, JC
    Powell, JD
    Bishop, M
    PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 144 - 149
  • [24] Modeling Software Security Requirements Through Functionality Rank Diagrams
    Goel, Rajat
    Govil, M. C.
    Singh, Girdhari
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT V, 2016, 9790 : 398 - 409
  • [25] Security assessment of electricity-gas-heat integrated energy systems based on the vulnerability index
    Tian, Xingtao
    Lin, Xiaojie
    Zhong, Wei
    Zhou, Yi
    ENERGY, 2022, 249
  • [26] Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing
    Lee, Kyungroul
    Yim, Kangbin
    SENSORS, 2023, 23 (07)
  • [27] The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks
    Algarni, Abdullah M.
    COMPUTERS, 2022, 11 (09)
  • [28] Integrated energy security assessment
    Augutis, Juozas
    Krikstolaitis, Ricardas
    Martisauskas, Linas
    Peciulyte, Sigita
    Zutautaite, Inga
    ENERGY, 2017, 138 : 890 - 901
  • [29] Integrated risk assessment and security
    Mahutova, K
    Barich, JJ
    CHEMISTRY FOR THE PROTECTION OF THE ENVIRONMENT 4, 2005, 59 : 177 - 182
  • [30] Cyber Security Vulnerability Assessment for Smart Substations
    Chai Jiwen
    Liu Shanmei
    2016 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2016, : 1368 - 1373