2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applicat 2021
DOI: 10.1109/idaacs53288.2021.9660968
|View full text |Cite
|
Sign up to set email alerts
|

CPE and CVE based Technique for Software Security Risk Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Their algorithm supports the mapping of vulnerabilities to software and automates the searching against known vulnerabilities through NVD, nevertheless, it does not consider TI sources. Russo et al 19 presented an automated vulnerability-oriented approach through a custom-made software platform, based on NIST 800-30 guidance. 9 Contrary to our work, these techniques and methods are subject to the same predispositions addressed earlier in this section.…”
Section: Vulnerability-orientedmentioning
confidence: 99%
“…Their algorithm supports the mapping of vulnerabilities to software and automates the searching against known vulnerabilities through NVD, nevertheless, it does not consider TI sources. Russo et al 19 presented an automated vulnerability-oriented approach through a custom-made software platform, based on NIST 800-30 guidance. 9 Contrary to our work, these techniques and methods are subject to the same predispositions addressed earlier in this section.…”
Section: Vulnerability-orientedmentioning
confidence: 99%
“…CVE records are accompanied by CVSS ** , a scoring system that provides security metrics for vulnerabilities. An example of using CVE, CPE, and CVSS for cybersecurity risk management can be found in the work of Ushakov et al 66 . The remotely exploitable vulnerabilities are marked by the Network attack vector in CVSS.…”
Section: Proposed Decision Support Systemmentioning
confidence: 99%
“…An example of using CVE, CPE, and CVSS for cybersecurity risk management can be found in the work of Ushakov et al. 66 The remotely exploitable vulnerabilities are marked by the Network attack vector in CVSS. The Impact Metrics refer to the potential impact of a successful exploit on CIA and have the values of None, Low, and High.…”
Section: Security State Assessmentmentioning
confidence: 99%
“…It is the list of all types of vulnerabilities and its subtypes. CVE's mission is to facilitate data sharing across various vulnerability capabilities (tools, repositories, and services) via this common enumeration [30].…”
Section: Proposed Docker-security Designmentioning
confidence: 99%