Modeling the vulnerability discovery process

被引:59
作者
Alhazmi, O. H. [1 ]
Malaiya, Y. K. [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
来源
16TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS | 2005年
关键词
D O I
10.1109/ISSRE.2005.30
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security vulnerabilities in servers and operating systems are software defects that represent great risks. Both software developers and users are struggling to contain the risk posed by these vulnerabilities. The vulnerabilities are discovered by both developers and external testers throughout the life-span of a software system. A few models for the vulnerability discovery process have just been published recently. Such models will allow effective resource allocation for patch development and are also needed for evaluating the risk of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models are examined both analytically and using actual data on vulnerabilities discovered in three widely-used systems. The applicability of the proposed models and significance of the parameters involved are discussed The limitations of the proposed models are examined and major research challenges are identified
引用
收藏
页码:129 / 138
页数:10
相关论文
共 18 条
[1]  
AKAIKE H, 1982, 2397 NTIS
[2]  
Alhazmi O, 2005, LECT NOTES COMPUT SC, V3654, P281
[3]   Quantitative vulnerability assessment of systems software [J].
Alhazmi, OH ;
Malaiya, YK .
ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2005 PROCEEDINGS, 2005, :615-620
[4]  
ALHAZMI OH, 2006, IN PRES P REL MAINT
[5]  
ANDERSON RJ, 2002, SECURITY OPENS VERSU
[6]  
BEATTIE S, 2002, P LISA, V16, P233
[7]  
Bishop P., 1996, IEEE T RELIABILITY, V45
[8]  
Brady R., 1999, 471 CAMBR U COMP LAB
[9]   A trend analysis of exploitations [J].
Browne, HK ;
Arbaugh, WA ;
McHugh, J ;
Fithen, WL .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :214-229
[10]   Reducing internet-based instructions: Effective security patch management [J].
Brykczynski, H ;
Small, RA .
IEEE SOFTWARE, 2003, 20 (01) :50-+