It Doesn't Have to Be Like This Cybersecurity Vulnerability Trends

被引:0
作者
Kuhn, Rick [1 ]
Raunak, Mohammad [2 ]
Kacker, Raghu [3 ]
机构
[1] NIST, Comp Secur Div, Gaithersburg, MD 20899 USA
[2] Loyola Univ Maryland, Comp Sci Dept, Baltimore, MD USA
[3] NIST, Appl & Computat Math Div, Gaithersburg, MD 20899 USA
关键词
cybersecurity; data breaches; vulnerabilities;
D O I
10.1109/MITP.2017.4241462
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given the large and impactful data breaches making headlines in recent years, Internet users naturally wonder: Why is this happening, and how much worse can it get? Here, the authors review trends in vulnerabilities, looking at earlier findings discussed in a previous installment of this column, as well as more recent trends. They also highlight prospects for the future. © 1999-2012 IEEE.
引用
收藏
页码:66 / 70
页数:5
相关论文
共 7 条
[1]   Defeating Buffer Overflow A Trivial but Dangerous Bug [J].
Black, Paul E. ;
Bojanova, Irena .
IT PROFESSIONAL, 2016, 18 (06) :58-61
[2]  
Heffley J., 37 ANN HAWAII INT C, P10, DOI DOI 10.1109/HICSS.2004.1265654
[3]  
Jones C, 2008, CROSSTALK J DEFE JUN
[4]   An Analysis of Vulnerability Trends, 2008-2016 [J].
Kuhn, D. Richard ;
Raunak, M. S. ;
Kacker, Raghu .
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, :587-588
[5]   Introducing insecure IT [J].
Kuhn, Rick ;
Rossman, Hart ;
Liu, Simon .
IT Professional, 2009, 11 (01) :24-26
[6]   Vulnerability Trends: Measuring Progress [J].
Kuhn, Rick ;
Johnson, Chris .
IT PROFESSIONAL, 2010, 12 (04) :51-53
[7]   Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining [J].
Medeiros, Iberia ;
Neves, Nuno ;
Correia, Miguel .
IEEE TRANSACTIONS ON RELIABILITY, 2016, 65 (01) :54-69