2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS) 2016
DOI: 10.1109/rains.2016.7764378
|View full text |Cite
|
Sign up to set email alerts
|

Centralized vulnerability database for organization specific automated vulnerabilities discovery and supervision

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Therein, CVSS is the most adopted information utilized by 15 selected papers where it quantifies the evaluation of vulnerability impact. For example, five studies, Frei et al (2006), Gallon (2011), Chang et al (2011), Jiang et al (2019), investigate the trends and distribution of vulnerabilities in databases in terms of CVSS; Seven studies, Roschke et al (2009), Wang and Guo (2009), Shahzad et al (2012), Kuo et al (2013), Kim et al (2013), ur Rahman et al (2016), and Jiang et al (2019, propose approaches to merge vulnerability databases also taken into account CVSS as one of their key information resources; CVSS is also used in two studies toward vulnerability-related predictions, i.e., Zhang et al (2015), Han et al (2017). In addition, OVAL, Jira issues, CAPEC, CRE, ERI, SCAP, Code gadgets, emails from the OSS project mailing list, and user contributed attacks and vulnerabilities are also used as information sources in 10 studies reported in Table 6.…”
Section: Rq 3 What Are the Other Sources Of Information Adopted To F...mentioning
confidence: 99%
“…Therein, CVSS is the most adopted information utilized by 15 selected papers where it quantifies the evaluation of vulnerability impact. For example, five studies, Frei et al (2006), Gallon (2011), Chang et al (2011), Jiang et al (2019), investigate the trends and distribution of vulnerabilities in databases in terms of CVSS; Seven studies, Roschke et al (2009), Wang and Guo (2009), Shahzad et al (2012), Kuo et al (2013), Kim et al (2013), ur Rahman et al (2016), and Jiang et al (2019, propose approaches to merge vulnerability databases also taken into account CVSS as one of their key information resources; CVSS is also used in two studies toward vulnerability-related predictions, i.e., Zhang et al (2015), Han et al (2017). In addition, OVAL, Jira issues, CAPEC, CRE, ERI, SCAP, Code gadgets, emails from the OSS project mailing list, and user contributed attacks and vulnerabilities are also used as information sources in 10 studies reported in Table 6.…”
Section: Rq 3 What Are the Other Sources Of Information Adopted To F...mentioning
confidence: 99%
“…Centralization. Kim et al [27] and Rahman et al [48] focus on different types of databases to propose a model for a centralized database that contains aggregated vulnerability information and can improve vulnerability management. (Sub-)Domain-specific Analysis.…”
Section: Related Workmentioning
confidence: 99%
“…So, this information is highly important for any security-related stakeholder that is involved in the software's life cycle. However, this information is scattered across these databases, describes often only a single stakeholder's perspective [48], and fluctuates in quality and granularity [43]. This makes it difficult to determine the threat level of a software system, which is also influenced by many other factors.…”
Section: Introductionmentioning
confidence: 99%