2015
DOI: 10.1007/978-3-319-25645-0_29
|View full text |Cite
|
Sign up to set email alerts
|

Assessing Attack Surface with Component-Based Package Dependency

Abstract: Package dependency has been considered in many vulnerability assessment systems. However, existing approaches are either coarse-grained and do not accurately reveal the influence and severity of vulnerabilities, or do not provide comprehensive (both incoming and outgoing) analysis of attack surface through package dependency. We propose a systematic approach of measuring attack surface exposed by individual vulnerabilities through component level dependency analysis. The metric could potentially extended to ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 46 publications
0
9
0
Order By: Relevance
“…[15] States that current CVSS do not reveal the fact that vulnerabilities on highly depended packages usually bring larger attack surfaces compared to those detected on a client application, even when they have the same CVSS scores. [15] Studied the impacts of components dependencies which refer to a code reuse by a component from the library packages that it relies upon. [16] Presents a risk estimation model that makes use of CVSS to produce security risk levels implemented as a Bayesian Belief Network (BBN) topology.…”
Section: The Proposed Frameworkmentioning
confidence: 97%
See 2 more Smart Citations
“…[15] States that current CVSS do not reveal the fact that vulnerabilities on highly depended packages usually bring larger attack surfaces compared to those detected on a client application, even when they have the same CVSS scores. [15] Studied the impacts of components dependencies which refer to a code reuse by a component from the library packages that it relies upon. [16] Presents a risk estimation model that makes use of CVSS to produce security risk levels implemented as a Bayesian Belief Network (BBN) topology.…”
Section: The Proposed Frameworkmentioning
confidence: 97%
“…Researchers studied the impacts of component dependency graphs [12] [13] [14]. [15] Claims that CVSS does not take into consideration component dependencies, which impacts dramatically the exploitability of a vulnerability. [15] States that current CVSS do not reveal the fact that vulnerabilities on highly depended packages usually bring larger attack surfaces compared to those detected on a client application, even when they have the same CVSS scores.…”
Section: The Proposed Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach tries to increase the attack surface of an application by bringing content-based package dependency into play. Vulnerabilities on highly dependent packages usually bring larger attack surfaces compared to those detected on a client application, even when they have the same CVSS scores, 13 and CVSSv2 does not reveal that fact. Thus, by bringing CMS content-based package dependency vulnerabilities to Glastopf, the attack surface of this application would increase even though that may not reflect in CVSSv2 score.…”
Section: Approachmentioning
confidence: 99%
“…Zhang et al [35] proposed an approach for estimating the security risk for a software project by considering known security vulnerabilities in its dependencies, however the approach does not consider any evidence for the presence of a vulnerability. Dumitras et al [36] discussed a risk model for managing software upgrades in enterprise systems.…”
Section: Empirical Studies On Trade-offs Between the Security Risk Pomentioning
confidence: 99%