2016
DOI: 10.1007/s10207-016-0345-x
|View full text |Cite
|
Sign up to set email alerts
|

Periodicity in software vulnerability discovery, patching and exploitation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…In contrast, it would be surprising if a software engineering study would not reveal longitudinal effects in a period covering almost a decade. The result is also familiar from comparable studies about vulnerability coordination [88] and time series aspects of vulnerability archiving [37,106]. If avoiding delays is important, the results can be also used to conjecture that "do not request CVEs during weekends".…”
Section: Main Findingsmentioning
confidence: 88%
See 2 more Smart Citations
“…In contrast, it would be surprising if a software engineering study would not reveal longitudinal effects in a period covering almost a decade. The result is also familiar from comparable studies about vulnerability coordination [88] and time series aspects of vulnerability archiving [37,106]. If avoiding delays is important, the results can be also used to conjecture that "do not request CVEs during weekends".…”
Section: Main Findingsmentioning
confidence: 88%
“…There exists also monthly variation in the delays. In addition to annual holidays, another reason may relate to security conferences and related events that tend to spike the public disclosure of new vulnerabilities [37]. In any case, it is simpler to interpret the positive effect of WEEKEND.…”
Section: Regression Estimatesmentioning
confidence: 99%
See 1 more Smart Citation
“…Actually, in the paper, the authors does not empathize the seasonal datasets, but four quantifiable and distinct characteristics which can be found in software vulnerabilities: Half-life, Prevalence, Persistence and Exploitation. However, among the datasets what day presents turns out that there are indeed periodic patterns [7]. Half-life represents "time interval for reducing occurrence of a vulnerability by half.…”
Section: Discussionmentioning
confidence: 99%
“…There is a significant corpus of research to examine vulnerabilities and forecast them with regression-based empirical estimation (Alhazmi et al , 2007; Cheminod et al , 2017; Massacci and Nguyen, 2014; Mitra and Ransbotham, 2015; Ransbotham et al , 2012; Ruohonen et al , 2015) and linear econometric modelling (Edwards et al , 2016; Johnson et al , 2016; Joh and Malaiya, 2017; Roumani et al , 2015; Sokol and Gajdoš, 2017; Tang et al , 2017; Woo et al , 2011). What is missing from the extant literature is an in-depth longitudinal examination of vulnerability growth pattern that can measure and forecast their behaviour from time-based history rather than cumulative cross-sectional data.…”
Section: Introductionmentioning
confidence: 99%