Modeling the vulnerability discovery process

被引:58
|
作者
Alhazmi, O. H. [1 ]
Malaiya, Y. K. [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/ISSRE.2005.30
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security vulnerabilities in servers and operating systems are software defects that represent great risks. Both software developers and users are struggling to contain the risk posed by these vulnerabilities. The vulnerabilities are discovered by both developers and external testers throughout the life-span of a software system. A few models for the vulnerability discovery process have just been published recently. Such models will allow effective resource allocation for patch development and are also needed for evaluating the risk of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models are examined both analytically and using actual data on vulnerabilities discovered in three widely-used systems. The applicability of the proposed models and significance of the parameters involved are discussed The limitations of the proposed models are examined and major research challenges are identified
引用
收藏
页码:129 / 138
页数:10
相关论文
共 50 条
  • [41] IKE vulnerability discovery based on fuzzing
    Yang, Huan
    Zhang, Yuqing
    Hu, Yu-pu
    Liu, Qi-xu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 889 - 901
  • [42] Prediction capabilities of vulnerability discovery models
    Alhazmi, Omar H.
    Malaiya, Yashwant K.
    2006 PROCEEDINGS - ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, VOLS 1 AND 2, 2006, : 86 - +
  • [43] Vulnerability discovery modelling: A general framework
    Anand A.
    Bhatt N.
    Alhazmi O.H.
    International Journal of Information and Computer Security, 2021, 16 (1-2) : 192 - 206
  • [44] Fuzzing: On the Exponential Cost of Vulnerability Discovery
    Bohme, Marcel
    Falk, Brandon
    PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 713 - 724
  • [45] Formal modeling of vulnerability
    Fithen, WL
    Hernan, SV
    O'Rourke, PF
    Shinberg, DA
    BELL LABS TECHNICAL JOURNAL, 2004, 8 (04) : 173 - 186
  • [46] Vulnerability Patch Modeling
    Kansal, Yogita
    Kumar, Deepak
    Kapur, P. K.
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY & SAFETY ENGINEERING, 2016, 23 (06):
  • [47] Vulnerability Analysis and Modeling
    Brown, Mikeera
    Pollock, Shawnoah
    Elmannai, Wafa
    Joseph, Michael
    Elleithy, Khaled
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 455 - 461
  • [48] Evaluation of Branch Prediction Vulnerability and New Vulnerability Discovery on ARM Processors
    Wang C.
    Tian R.
    Zhao X.
    Lü Y.
    Wang D.
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2021, 55 (07): : 71 - 78
  • [49] Distributed process modeling for regional assessment of coastal vulnerability to sea-level rise
    Brett Bryan
    Nick Harvey
    Tony Belperio
    Bob Bourman
    Environmental Modeling & Assessment, 2001, 6 : 57 - 65
  • [50] Process-based monitoring and modeling of Karst springs - Linking intrinsic to specific vulnerability
    Epting, Jannis
    Page, Rebecca M.
    Auckenthaler, Adrian
    Huggenberger, Peter
    SCIENCE OF THE TOTAL ENVIRONMENT, 2018, 625 : 403 - 415