Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS

被引:25
作者
Allodi, Luca [1 ]
Banescu, Sebastian [2 ]
Femmer, Henning [2 ]
Beckers, Kristian [3 ]
机构
[1] Eindhoven Univ Technol, Eindhoven, Netherlands
[2] Tech Univ Munich, Munich, Germany
[3] Social Engn Acad SEA GmbH, Frankfurt, Germany
来源
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18) | 2018年
关键词
software vulnerability assessment; vulnerability information; CVSS; OVERLOAD;
D O I
10.1145/3176258.3176340
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The assessment of new vulnerabilities is an activity that accounts for information from several data sources and produces a 'severity' score for the vulnerability. The Common Vulnerability Scoring System (CVSS) is the reference standard for this assessment. Yet, no guidance currently exists on which information aids a correct assessment and should therefore be considered. In this paper we address this problem by evaluating which information cues increase (or decrease) assessment accuracy. We devise a block design experiment with 67 software engineering students with varying vulnerability information and measure scoring accuracy under different information sets. We find that baseline vulnerability descriptions provided by standard vulnerability sources provide only part of the information needed to achieve an accurate vulnerability assessment. Further, we find that additional information on assets, attacks, and vulnerability type contributes in increasing the accuracy of the assessment; conversely, information on known threats misleads the assessor and decreases assessment accuracy and should be avoided when assessing vulnerabilities. These results go in the direction of formalizing the vulnerability communication to, for example, fully automate security assessments.
引用
收藏
页码:119 / 126
页数:8
相关论文
共 34 条
[1]  
Thompson CA, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P281, DOI [10.1145/2901739.2901779, 10.1109/MSR.2016.036]
[2]  
Allodi L., 2013, P IWCC 13
[3]   Comparing Vulnerability Severity and Exploits Using Case-Control Studies [J].
Allodi, Luca ;
Massacci, Fabio .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
[4]  
[Anonymous], 2015, NIST national vulnerability database
[5]  
[Anonymous], 2002, TECHNICAL REPORT
[6]  
[Anonymous], 2005, ISO/IEC 27001
[7]  
[Anonymous], 2010, PCI COUNCIL PCI DSS
[8]   Knowledge for software security [J].
Barnum, S ;
McGraw, G .
IEEE SECURITY & PRIVACY, 2005, 3 (02) :74-78
[9]  
Christey S., 2013, BlackHat
[10]  
Dashevskyi Stanislav, 2016, Engineering Secure Software and Systems. 8th International Symposium, ESSoS 2016. Proceedings: LNCS 9639, P190, DOI 10.1007/978-3-319-30806-7_12