Security Vulnerability Assessment for Software Version Upgrade

被引:0
作者
Treetippayaruk, Sirikwan [1 ]
Senivongse, Twittie [1 ]
机构
[1] Chulalongkorn Univ, Fac Engn, Dept Comp Engn, Software Engn Program, Bangkok, Thailand
来源
2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017) | 2017年
关键词
security vulnerability; CVSS; NVD; security assessment; software upgrade;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Software installed on a computer does have security vulnerabilities to which an attacker can have access and do harm to the computer. It is known to be a good practice to install updates or upgrade versions of the software regularly to improve features, stability, and security, but often those updates and upgrades are ignored or delayed for several reasons. In addition, the new releases may come with some other vulnerabilities themselves. The motivation of this paper is to give information to computer users about the impact of software upgrade in terms of severity of the vulnerabilities that would result from the upgrade, in comparison with that of the vulnerabilities of the currently installed software. We propose a method to assess security vulnerabilities of the installed and the latest versions based on the CVSS vulnerability scoring system. Severity of vulnerabilities will be reported to suggest whether the upgrade is really needed to improve security. We also present an assessment tool that supports both personal and corporate use.
引用
收藏
页码:283 / 289
页数:7
相关论文
共 12 条
  • [1] [Anonymous], COMM VULN SCOR SYST
  • [2] Enhancing service-side QoS monitoring for Web services
    Artaiam, Natee
    Senivongse, Twittie
    [J]. PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 765 - 770
  • [3] FIRST. Org Inc, 2007, COMPLETE GUIDE COMMO
  • [4] Frei S., 2006, P 2006 SIGCOMM WORKS, P131, DOI DOI 10.1145/1162666.1162671
  • [5] Fruhwirth Christian, 2009, 2009 3rd International Symposium on Empirical Software Engineering and Measurement (ESEM), P535, DOI 10.1109/ESEM.2009.5314230
  • [6] IBM Security, IBM X FORC EXCH API
  • [7] Janluechai P., 2004, THESIS
  • [8] MITRE, Common vulnerabilities and exposure
  • [9] NIST, 2008, NIST SPEC PUBL, VII
  • [10] NIST, National Vulnerability Database