16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05)
DOI: 10.1109/issre.2005.30
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the Vulnerability Discovery Process

Abstract: Security vulnerabilities in servers and operating systems are software defects that represent great risks.Both software developers and users are struggling to contain the risk posed by these vulnerabilities. The vulnerabilities are discovered by both developers and external testers throughout the life-span of a software system. A few models for the vulnerability discovery process have just been published recently.Such models will allow effective resource allocation for patch development and are also needed for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
79
0

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 92 publications
(80 citation statements)
references
References 13 publications
1
79
0
Order By: Relevance
“…where B represents the estimated total number of vulnerabilities and the parameters A and C determine the shape of the curve [7]. The model is based on the assumption that the vulnerability discovery process is controlled by the market share of the software and the number of vulnerabilities remaining undiscovered [8].…”
Section: A Aml Vulnerability Discovery Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…where B represents the estimated total number of vulnerabilities and the parameters A and C determine the shape of the curve [7]. The model is based on the assumption that the vulnerability discovery process is controlled by the market share of the software and the number of vulnerabilities remaining undiscovered [8].…”
Section: A Aml Vulnerability Discovery Modelmentioning
confidence: 99%
“…The model is based on the assumption that the vulnerability discovery process is controlled by the market share of the software and the number of vulnerabilities remaining undiscovered [8]. This model has been found to yield a significant goodness-of-fit for many widely used software systems [7,8,9,21]. However the plots of actual data sometimes show a departure from the model following the release of a new version [8].…”
Section: A Aml Vulnerability Discovery Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…In [12], Rescorla has studied vulnerabilities in open source servers. The vulnerabilities discovery process in operating systems has just recently been examined by Rescorla [13] and by Alhazmi and Malaiya [14,15,16].…”
Section: Introductionmentioning
confidence: 99%