Proceedings of the 18th International Conference on Security and Cryptography 2021
DOI: 10.5220/0010559402590270
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Metrics for Graph-based Configuration Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…A "good" attack surface metric should be able to identify and credibly enumerate all attack paths 6 by conducting an in-depth analysis of each path's entry and exit points or target points, implicit and explicit interdependencies, and vulnerabilities. 7 Stuckman and Purtilo highlighted that an attack surface metric quantifies the scale of vulnerabilities of a system. 6 They suggested that, in analyzing a system's security posture, a good metric will demonstrate that software with fewer vulnerabilities is more secure than software with more exposures.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…A "good" attack surface metric should be able to identify and credibly enumerate all attack paths 6 by conducting an in-depth analysis of each path's entry and exit points or target points, implicit and explicit interdependencies, and vulnerabilities. 7 Stuckman and Purtilo highlighted that an attack surface metric quantifies the scale of vulnerabilities of a system. 6 They suggested that, in analyzing a system's security posture, a good metric will demonstrate that software with fewer vulnerabilities is more secure than software with more exposures.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, we focus our attention on features of the vulnerabilities themselves and on any information that may be available to potential attackers and that could influence their selection of target exploits. 7,19 We define the exploitation likelihood (or simply likelihood) of a vulnerability as the probability that an attacker will attempt to exploit that vulnerability, if given the opportunity. An attacker has the opportunity to exploit a vulnerability if certain preconditions are met, most notably if they have access to the vulnerable host and have sufficient privileges.…”
Section: Exploit Likelihoodmentioning
confidence: 99%
See 3 more Smart Citations