Modeling the vulnerability discovery process

被引:58
|
作者
Alhazmi, O. H. [1 ]
Malaiya, Y. K. [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/ISSRE.2005.30
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security vulnerabilities in servers and operating systems are software defects that represent great risks. Both software developers and users are struggling to contain the risk posed by these vulnerabilities. The vulnerabilities are discovered by both developers and external testers throughout the life-span of a software system. A few models for the vulnerability discovery process have just been published recently. Such models will allow effective resource allocation for patch development and are also needed for evaluating the risk of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models are examined both analytically and using actual data on vulnerabilities discovered in three widely-used systems. The applicability of the proposed models and significance of the parameters involved are discussed The limitations of the proposed models are examined and major research challenges are identified
引用
收藏
页码:129 / 138
页数:10
相关论文
共 50 条
  • [31] A new modeling approach for quantifying expert opinion in the drug discovery process
    Alonso, Ariel
    Milanzi, Elasma
    Molenberghs, Geert
    Buyck, Christophe
    Bijnens, Luc
    STATISTICS IN MEDICINE, 2015, 34 (09) : 1590 - 1604
  • [32] Empirical characterization of the likelihood of vulnerability discovery
    Wilhjelm C.
    Kotadiya T.
    Younis A.A.
    International Journal of Performability Engineering, 2020, 16 (07) : 1008 - 1018
  • [33] Survey of Software Vulnerability Discovery Technology
    Wang, Wei
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON SOCIAL NETWORK, COMMUNICATION AND EDUCATION (SNCE 2017), 2017, 82 : 9 - 13
  • [34] Information gathering for semantic service discovery and composition in business process modeling
    May, Norman
    Weber, Ingo
    ADVANCES IN ENTERPRISE ENGINEERING I, PROCEEDINGS, 2008, 10 : 46 - 60
  • [35] mSigHdp: hierarchical Dirichlet process mixture modeling for mutational signature discovery
    Liu, Mo
    Wu, Yang
    Jiang, Nanhai
    Boot, Arnoud
    Rozen, Steven G.
    NAR GENOMICS AND BIOINFORMATICS, 2023, 5 (01)
  • [36] CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery
    Ganz, Tom
    Imgrund, Erik
    Haerterich, Martin
    Rieck, Konrad
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVII, DBSEC 2023, 2023, 13942 : 282 - 301
  • [37] Software Vulnerability Discovery Techniques: A Survey
    Liu, Bingchang
    Shi, Liang
    Cai, Zhuhua
    Li, Min
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 152 - 156
  • [38] AGENT BASED VULNERABILITY DISCOVERY MODEL
    Dobrovoljc, Andrej
    SOR'13 PROCEEDINGS: THE 12TH INTERNATIONAL SYMPOSIUM ON OPERATIONAL RESEARCH IN SLOVENIA, 2013, : 379 - 384
  • [39] An Independent Validation of Vulnerability Discovery Models
    Viet Hung Nguyen
    Massacci, Fabio
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [40] Practitioner Perception of Vulnerability Discovery Strategies
    Bhuiyan, Farzana Ahamed
    Murphy, Justin
    Morrison, Patrick
    Rahman, Akond
    2021 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2021), 2021, : 41 - 44