Analysis of software vulnerability classification based on different technical parameters

被引:11
|
作者
Garg, Shivi [1 ]
Singh, R. K. [1 ]
Mohapatra, A. K. [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Informat Technol Dept, New Delhi, India
来源
INFORMATION SECURITY JOURNAL | 2019年 / 28卷 / 1-2期
关键词
Malicious; malware; software; security; taxonomy; vulnerability; EMBEDDED SYSTEMS SECURITY; ATTACK; MODEL;
D O I
10.1080/19393555.2019.1628325
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a comprehensive analysis of software vulnerabilities based on different technical parameters. The taxonomy of vulnerabilities presented here offers an insight into their frequency; susceptibility; correlation with instances or events, exploits, and artifacts; and assessment of the successful countermeasures. Furthermore, this paper presents the current state-of-the-art in the domain of software threats and vulnerabilities. In addition, it highlights various methods for identification of different types of vulnerabilities. These methods have their own advantages, associated costs, and inherent risks. The current work would help analyze various threats that a system could face, and subsequently it could guide the security engineer to take quick and cost-effective countermeasures.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [31] Software-Based Register File Vulnerability Reduction for Embedded Processors
    Lee, Jongeun
    Shrivastava, Aviral
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 13
  • [32] The Plan and Tools for Vulnerability Testing in Information Software-Based System
    Kim, Injung
    Lee, Younggyo
    Won, Dongho
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2005, 1 (01): : 75 - 78
  • [33] Groundwater Vulnerability and Risk Mapping Based on Residence Time Distributions: Spatial Analysis for the Estimation of Lumped Parameters
    Dedewanou, M.
    Binet, S.
    Rouet, J. L.
    Coquet, Y.
    Bruand, A.
    Noel, H.
    WATER RESOURCES MANAGEMENT, 2015, 29 (15) : 5489 - 5504
  • [34] A Simulation based Intelligent Analysis Framework of Aircraft Reliability, Resilience and Vulnerability
    Yao, Qi
    Zeng, Fuping
    Zhang, Yizhuo
    Yang, Minghao
    Duan, Zhiyu
    Yang, Shunkun
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 347 - 356
  • [35] Developer's Roadmap to Design Software Vulnerability Detection Model Using Different AI Approaches
    Pooja, S.
    Chandrakala, C. B.
    Raju, Laiju K.
    IEEE ACCESS, 2022, 10 : 75637 - 75656
  • [36] An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure
    Arora, Ashish
    Krishnan, Ramayya
    Telang, Rahul
    Yang, Yubao
    INFORMATION SYSTEMS RESEARCH, 2010, 21 (01) : 115 - 132
  • [37] ANALYSIS OF TECHNICAL DEBT IN NOVICE SOFTWARE DEVEL OPERS: AN ACADEMIC PERSPECTIVE
    Torres, Edwin Fabricio Lozada
    Pico, Maria Angelica Pico
    Moya, Jorge Rene Viteri
    REVISTA UNIVERSIDAD Y SOCIEDAD, 2023, 15 : 389 - 397
  • [38] Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability
    Yin, Xin
    Ni, Chao
    Wang, Shaohua
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (11) : 3071 - 3087
  • [39] Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things
    Jeon, So-Eun
    Lee, Sun-Jin
    Lee, Il-Gu
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (02): : 2407 - 2419
  • [40] Cross-Project Vulnerability Prediction Based on Software Metrics and Deep Learning
    Kalouptsoglou, Ilias
    Siavvas, Miltiadis
    Tsoukalas, Dimitrios
    Kehagias, Dionysios
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2020, PART IV, 2020, 12252 : 877 - 893