2020
DOI: 10.1109/tdsc.2019.2893950
|View full text |Cite
|
Sign up to set email alerts
|

Large Scale Characterization of Software Vulnerability Life Cycles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…Other research finds that manufacturers' "patch release behavior is an under investigated component of overall software quality and security" [49, p. 116]. Several studies, e.g., [9], find that there are significant delays between vulnerability disclosure and patch release. One good example is Android OS, where there are significant differences in the U&P frequency between phone manufacturers [50].…”
Section: Software Engineering For Internet Of Things' Patches and Upd...mentioning
confidence: 99%
See 1 more Smart Citation
“…Other research finds that manufacturers' "patch release behavior is an under investigated component of overall software quality and security" [49, p. 116]. Several studies, e.g., [9], find that there are significant delays between vulnerability disclosure and patch release. One good example is Android OS, where there are significant differences in the U&P frequency between phone manufacturers [50].…”
Section: Software Engineering For Internet Of Things' Patches and Upd...mentioning
confidence: 99%
“…Researchers attribute the potential to protect devices to both users and manufacturers, and thus to software engineers [1], [8]. However, many manufacturers do not provide patches in a timely manner [9]. While IoT standards for providing FW updates exist [10], [11], these do not appear very institutionalized.…”
Section: Introductionmentioning
confidence: 99%
“…The life-cycle of a vulnerability typically refers to the time of i) introduction, ii) discovery (may never be known/ documented), iii) disclosure (vulnerability being disclosed to the corresponding package maintainers), iv) advisory publication (in vulnerability databases), v) fix availability, and vi) exploit availability [35], [36]. Prior work [11], [18], [31], [35], [36], [37], [38], [39] has looked at the time duration between vulnerability disclosure, fix availability, and exploit availability. Li and Paxson [6] have looked at the time duration between vulnerability introduction, discovery, and commit date of the code changes that fix the vulnerability.…”
Section: Vulnerability Life Cyclementioning
confidence: 99%
“…Imtiaz et al [19], when comparing popular SCA tools, found six of the nine studied tools to have reported unique non-CVEs that were not reported by the other tools in the study. However, while the CVE data is widely accepted within the security community, and well studied in the literature [6], [11], [35], [36], [37], [38], vulnerabilities without a CVE identifier are still under-studied, although they are not uncommon in the open source vulnerability databases [19]. Approximately one-fourth of the advisories in our dataset are non-CVEs which provides us with a unique opportunity to compare CVEs and non-CVEs relative to security release practices.…”
Section: Cves Vs Non-cvesmentioning
confidence: 99%
“…S oftware vulnerabilities generally refer to security flaws in source code and are prevalent in modern software system evolution [1]. Attackers can utilize unresolved vulnerabilities to undertake malicious activities, posing enormous risks to millions of users around the globe [2].…”
Section: Introductionmentioning
confidence: 99%