Using Software Reliability Models for Security Assessment - Verification of Assumptions

被引:0
|
作者
Lee, Da Young [1 ]
Vouk, Mladen [1 ]
Williams, Laurie [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Can software reliability models be used to assess software security? One of the issues is that security problems are relatively rare under "normal" operational profiles, while "classical" reliability models may not be suitable for use in attack conditions. We investigated a range of Fedora open source software security problems to see if some of the basic assumptions behind software reliability growth models hold for discovery of security problems in non-attack situations. We find that in some cases, under "normal" operational use, security problem detection process may be described as a Poisson process. In those cases, we can use appropriate classical software reliability growth models to assess "security reliability" of that software in non-attack situations.
引用
收藏
页码:23 / 24
页数:2
相关论文
共 50 条
  • [21] Reliability assessment of pipelines using phimeca software
    Amirat, A.
    Bounamous, B.
    Khelif, R.
    Chateauneuf, A. Mohamed
    Chaoui, K.
    SAFETY, RELIABILITY AND RISKS ASSOCIATED WITH WATER, OIL AND GAS PIPELINES, 2008, : 233 - +
  • [22] Software reliability, safety and security
    Krumov, Assen V.
    2005 IEEE INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2005, : 429 - 434
  • [23] Software Reliability Models and Assessment Techniques Review: Classification Issues
    Maevsky, Dmitry
    Kharchenko, Vyacheslav
    Kolisnyk, Maryna
    Maevskaya, Elena
    PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 2, 2017, : 894 - 899
  • [24] Software reliability models
    Krajcuskova, Zuzana
    2007 17TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA, VOLS 1 AND 2, 2007, : 51 - 54
  • [25] SOFTWARE RELIABILITY MODELS
    REGULINSKI, TL
    IEEE TRANSACTIONS ON RELIABILITY, 1979, 28 (03) : 177 - 177
  • [26] Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification
    Alhawi, Omar M.
    Mustafa, Mustafa A.
    Cordiro, Lucas C.
    2019 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2019), 2019, : 9 - 17
  • [27] Open source software: analysis of available reliability models keeping security in the forefront
    Tyagi S.
    Kumar D.
    Kumar S.
    International Journal of Information Technology, 2022, 14 (2) : 1041 - 1050
  • [28] PREDICTION OF SOFTWARE-RELIABILITY USING CONNECTIONIST MODELS
    KARUNANITHI, N
    WHITLEY, D
    MALAIYA, YK
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1992, 18 (07) : 563 - 574
  • [29] Effectively combining software verification strategies: Understanding different assumptions
    Owen, David
    Desovski, Dejan
    Cukic, Bojan
    ISSRE 2006:17TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2006, : 321 - +
  • [30] Software reliability assessment using accelerated testing methods
    Ehrlich, W. K.
    Nair, V. N.
    Alam, M. S.
    Chen, W. H.
    Applied Statistics. Journal of the Royal Statistical Society Series C, 47 (01):