2006
DOI: 10.1109/icsm.2006.40
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs

Abstract: When vulnerabilities are discovered in software, which often happens after deployment, they must be addressed as part of ongoing software maintenance. A mature software development organization should analyze vulnerabilities in order to determine how they, and similar vulnerabilities, can be prevented in the future.In this paper we present a structured method for analyzing and documenting the causes of software vulnerabilities. Applied during software maintenance, the method generates the information needed fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 32 publications
(19 citation statements)
references
References 6 publications
0
19
0
Order By: Relevance
“…As future work, we are investigating several approaches to improve the passive testing algorithms in order to perform online monitoring, possibly by including vulnerability cause graphs [4] of the implementation under test. We are also studying the different reactions that the network has to perform following a property violation detection.…”
Section: Discussionmentioning
confidence: 99%
“…As future work, we are investigating several approaches to improve the passive testing algorithms in order to perform online monitoring, possibly by including vulnerability cause graphs [4] of the implementation under test. We are also studying the different reactions that the network has to perform following a property violation detection.…”
Section: Discussionmentioning
confidence: 99%
“…Vulnerability modeling [5] is a process similar to root cause analysis, and results in a structure called a vulnerability cause graph (VCG), that models how causes (conditions or events that may contribute to the presence of a vulnerability; e.g. "Use of strcat") may contribute to the presence of software vulnerabilities.…”
Section: Process Stepsmentioning
confidence: 99%
“…Our process [2] consists of three major steps: vulnerability modeling [5], vulnerability cause mitigation [1], and process component definition. The process is described in section 2.…”
Section: Introductionmentioning
confidence: 99%
“…structured way [3,6,8]. S 3 P is designed to be process agnostic and is a software development improvement process that runs in parallel to the software life cycle and interacts with it to enhance security.…”
Section: Introductionmentioning
confidence: 99%