2012 34th International Conference on Software Engineering (ICSE) 2012
DOI: 10.1109/icse.2012.6227141
|View full text |Cite
|
Sign up to set email alerts
|

A large scale exploratory analysis of software vulnerability life cycles

Abstract: Abstract-Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles can help in the development, deployment, and maintenance of software systems. It can also help in designing future security policies and conducting audits of past incidents. Furthermore, such an analysis can help customers to assess the security risks associated with software products of different vendors.In this paper, we conduct an e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
98
1
2

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 138 publications
(104 citation statements)
references
References 15 publications
3
98
1
2
Order By: Relevance
“…Parsers are crawlers or scrapers designed to crawl the web and extract specific information about vulnerabilities, patches and exploits from the selected data sources. Currently we have parsers for six different vulnerability data sources (National Vulnerability Database data source 3 , Security database data source 4 , CVE data source 5 , CVE Details data source 6 , Security , Cisco 12 etc.,) and exploits from Exploit database 13 (illustrated by the left-most column in Figure 2). Due to the modular structure of the data collation framework, more parsers for other security data sources can easily be added.…”
Section: A Backendmentioning
confidence: 99%
“…Parsers are crawlers or scrapers designed to crawl the web and extract specific information about vulnerabilities, patches and exploits from the selected data sources. Currently we have parsers for six different vulnerability data sources (National Vulnerability Database data source 3 , Security database data source 4 , CVE data source 5 , CVE Details data source 6 , Security , Cisco 12 etc.,) and exploits from Exploit database 13 (illustrated by the left-most column in Figure 2). Due to the modular structure of the data collation framework, more parsers for other security data sources can easily be added.…”
Section: A Backendmentioning
confidence: 99%
“…It specifies the effort on estimating the effort required for developing new exploits. Mc Queen, Boyer and M.Chaffin in [4] specifies an empirical study on the total number of zero day vulnerabilities available on a single day based on existing facts about vulnerabilities. Wang, Noel and Jajodia in [7] proposed a method that views vulnerability as a Boolean variable and derive a logic proposition…”
Section: Related Workmentioning
confidence: 99%
“…The range of variables belongs to [1], [2]. With frameworks proposed in this paper, the results of memory allocation vulnerability analysis in C programs are showed in Table 1.…”
Section: Examplesmentioning
confidence: 99%
“…Unfortunately, the instability of software always brings information security problems. A tiny vulnerability of software could lead to a great harm [1]. A memory allocation known as a design vulnerability refers to performing manual memory management in C programs for dynamic memory allocation in C programming language via a group of function in C standard library, namely malloc( ), realloc( ), calloc( ) and free( ).…”
Section: Introductionmentioning
confidence: 99%