DocumentCode
2587673
Title
Modeling the vulnerability discovery process
Author
Alhazmi, O.H. ; Malaiya, Y.K.
Author_Institution
Dept. of Comput. Sci., Colorado State Univ., Fort Collins, CO
fYear
2005
fDate
1-1 Nov. 2005
Lastpage
138
Abstract
Security vulnerabilities in servers and operating systems are software defects that represent great risks. Both software developers and users are struggling to contain the risk posed by these vulnerabilities. The vulnerabilities are discovered by both developers and external testers throughout the life-span of a software system. A few models for the vulnerability discovery process have just been published recently. Such models will allow effective resource allocation for patch development and are also needed for evaluating the risk of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models are examined both analytically and using actual data on vulnerabilities discovered in three widely-used systems. The applicability of the proposed models and significance of the parameters involved are discussed. The limitations of the proposed models are examined and major research challenges are identified
Keywords
program testing; resource allocation; security of data; software fault tolerance; operating systems; patch development; resource allocation; security vulnerability; servers; software defects; vulnerability discovery process modeling; Computer science; Computer security; Investments; Life testing; Operating systems; Resource management; Software reliability; Software systems; Software testing; System testing;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Reliability Engineering, 2005. ISSRE 2005. 16th IEEE International Symposium on
Conference_Location
Chicago, IL
ISSN
1071-9458
Print_ISBN
0-7695-2482-6
Type
conf
DOI
10.1109/ISSRE.2005.30
Filename
1544728
Link To Document