DocumentCode
2393701
Title
System-based Approach to Software Vulnerability
Author
Al-Fedaghi, Sabah
Author_Institution
Comput. Eng. Dept., Kuwait Univ., Safat, Kuwait
fYear
2010
fDate
20-22 Aug. 2010
Firstpage
1072
Lastpage
1079
Abstract
The focus of vulnerability research has been conceptualization of the lifecycle of software vulnerability as errors in software that can be used by an attacker to gain access to a system or network. This lifecycle is described in terms of its phases: creation, discovery, exploitation, disclosure, patch availability, and patch installed. The objective of this paper is to clarify the notion of vulnerability so it complements current error-focused conceptualization. The paper proposes a fine-grained lifecycle of a vulnerable system in terms of a flowsystem that includes five basic stages and is defined by a flow transition diagram. A software system is first created, released, and transferred to users; it is then activated until it fails as a result of vulnerability to an attack. Several other phases lead to re-creation of the system. Accordingly, vulnerability is defined as the state of a system where it can be damaged when it receives a certain type of attack.
Keywords
security of data; software fault tolerance; fine-grained lifecycle; flow transition diagram; software system; software vulnerability; Databases; Frequency modulation; Hospitals; Programming; Security; Software systems; flow system; risk; software error; software vulnerability lifecycle;
fLanguage
English
Publisher
ieee
Conference_Titel
Social Computing (SocialCom), 2010 IEEE Second International Conference on
Conference_Location
Minneapolis, MN
Print_ISBN
978-1-4244-8439-3
Electronic_ISBN
978-0-7695-4211-9
Type
conf
DOI
10.1109/SocialCom.2010.159
Filename
5590497
Link To Document