Large Scale Characterization of Software Vulnerability Life Cycles

被引:15
作者
Shahzad, Muhammad [1 ]
Shafiq, M. Zubair [2 ]
Liu, Alex X. [3 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
[2] Univ Iowa, Dept Comp Sci, Iowa City, IA 52242 USA
[3] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
关键词
Computer hacking; Data aggregation; Linux; Market research; Microsoft Windows; Vulnerability; disclosure; patch; exploit; diversity; EMPIRICAL-ANALYSIS; IMPACT;
D O I
10.1109/TDSC.2019.2893950
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of various aspects related to vulnerabilities such as their severity, rates of disclosure, exploit and patch release, and existence of common vulnerabilities in different products can help in improving the development, deployment, and maintenance process of software systems. It can also help in designing future security policies and conducting audits of past incidents. Furthermore, such an analysis can help customers to assess the security risks associated with software products of different vendors. In this paper, we conduct an exploratory measurement study of a large software vulnerability data set containing 56077 vulnerabilities disclosed since 1988 till 2013. We investigate vulnerabilities along following eight dimensions: (1) phases in the life cycle of vulnerabilities, (2) evolution of vulnerabilities over the years, (3) functionality of vulnerabilities, (4) access requirement for exploitation of vulnerabilities, (5) risk level of vulnerabilities, (6) software vendors, (7) software products, and (8) existence of common vulnerabilities in multiple software products. Our exploratory analysis uncovers several statistically significant findings that have important implications for software development and deployment.
引用
收藏
页码:730 / 744
页数:15
相关论文
共 27 条
  • [1] Agrawal R., P 20 INT C VERY LARG, DOI DOI 10.1055/S-2007-996789
  • [2] Quantitative vulnerability assessment of systems software
    Alhazmi, OH
    Malaiya, YK
    [J]. ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2005 PROCEEDINGS, 2005, : 615 - 620
  • [3] Why information security is hard - An economic perspective
    Anderson, R
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 358 - 365
  • [4] Anderson R., 2002, C OPEN SOURCE SOFTWA, P1
  • [5] Competition and patching of security vulnerabilities: An empirical analysis
    Arora, Ashish
    Forman, Chris
    Nandkumar, Anand
    Telang, Rahul
    [J]. INFORMATION ECONOMICS AND POLICY, 2010, 22 (02) : 164 - 177
  • [6] An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure
    Arora, Ashish
    Krishnan, Ramayya
    Telang, Rahul
    Yang, Yubao
    [J]. INFORMATION SYSTEMS RESEARCH, 2010, 21 (01) : 115 - 132
  • [7] Bozorgi M., 2010, P 16 ACM SIGKDD INT, P105, DOI DOI 10.1145/1835804.1835821
  • [8] Christey S., 2002, Responsible Vulnerability Disclosure Process
  • [9] Clark S, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P251
  • [10] STUDENTS T-TEST UNDER SYMMETRY CONDITIONS
    EFRON, B
    [J]. JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 1969, 64 (328) : 1278 - &