Integrated software vulnerability and security functionality assessment

被引:2
|
作者
Wang, Xiangrong [1 ]
Shi, Hang [1 ]
Huang, Tze-Yau William [1 ]
Lin, Frank C. [1 ]
机构
[1] Cisco Syst Inc, Automated Test Ctr, 170 W TAsman Dr, San Jose, CA 95134 USA
关键词
D O I
10.1109/ISSRE.2007.20
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Product security is an on-going challenge for network equipment vendors. In this paper, we present a systematic methodology for some software vulnerability assessment and security function verification. Based on this approach, a scalable and adaptable automatic test system was implemented to test over a hundred production software releases over the past year. This paper describes the methodology, the framework, and the results.
引用
收藏
页码:103 / +
页数:2
相关论文
共 50 条
  • [31] Cyber security vulnerability assessment of power industry
    Yu, Jiaxi
    Mao, Anjia
    Guo, Zhizhong
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1379 - +
  • [32] Cyber/Physical Security Vulnerability Assessment Integration
    MacDonald, Doug
    Clements, Samuel L.
    Patrick, Scott W.
    Perkins, Casey
    Muller, George
    Lancaster, Mary J.
    Hutton, Will
    2013 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES (ISGT), 2013,
  • [33] The concept of vulnerability in security assessment of chemical plants
    Zhao, Dongfeng, 1600, Journal of Chemical and Pharmaceutical Research, 3/668 Malviya Nagar, Jaipur, Rajasthan, India (06):
  • [34] Software Support of the Common Criteria Vulnerability Assessment
    Bialas, Andrzej
    ADVANCES IN DEPENDABILITY ENGINEERING OF COMPLEX SYSTEMS, 2018, 582 : 26 - 38
  • [35] Vulnerability assessment of cyber security in power industry
    Yu Jiaxi
    Mao Anjia
    Guo Zhizhong
    2006 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION. VOLS 1-5, 2006, : 2200 - +
  • [36] Android Security Assessment Based on Reported Vulnerability
    Sugiono, Eko
    Asnar, Yudistira
    Liem, Inggriani
    2014 International Conference on Data and Software Engineering (ICODSE), 2014,
  • [37] A Software Assessment Method Based on Relevance Vulnerability
    Miao, Xudong
    Wang, Yongchun
    Cao, Xingchen
    Qu, Binbin
    Jiang, Sheng
    Fang, Feng
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 424 - 427
  • [38] Safety and Functionality Assessment of Railway Applications in Terms of Software
    Lueley, Peter
    Franekova, Maria
    Hudak, Marek
    TELEMATICS IN THE TRANSPORT ENVIRONMENT, 2012, 329 : 396 - +
  • [39] An Integrated Model for Software Security Testing Requirements
    Hui, Zhanwei
    Huang, Song
    Liu, Xiaoming
    Rao, Liping
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 1891 - 1895
  • [40] Advancing software security: DCodeBERT for automatic vulnerability detection and repair
    Bensaoud, Ahmed
    Kalita, Jugal
    Journal of Industrial Information Integration, 2025, 45