2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.48
|View full text |Cite
|
Sign up to set email alerts
|

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching

Abstract: Vulnerability exploits remain an important mechanism for malware delivery, despite efforts to speed up the creation of patches and improvements in software updating mechanisms. Vulnerabilities in client applications (e.g., browsers, multimedia players, document readers and editors) are often exploited in spear phishing attacks and are difficult to characterize using network vulnerability scanners. Analyzing their lifecycle requires observing the deployment of patches on hosts around the world. Using data colle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

8
82
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 103 publications
(91 citation statements)
references
References 24 publications
(27 reference statements)
8
82
0
1
Order By: Relevance
“…This requires the definition of models that jointly evaluate attacker's and defender's strategies: (89) several independent studies showed that most attacks are driven by a handful of vulnerabilities only, suggesting that attackers choose vulnerabilities to exploit as opposed to launching attacks drawn randomly from a pool of exploits for all vulnerabilities. (46,47,103) Capturing these aspects may require to integrate socioeconomic models to evaluate attacker's incentives in marketing or buying a new vulnerability (91,102) or choosing a target. (89) We consider these aspects for future work.…”
Section: Discussionmentioning
confidence: 99%
“…This requires the definition of models that jointly evaluate attacker's and defender's strategies: (89) several independent studies showed that most attacks are driven by a handful of vulnerabilities only, suggesting that attackers choose vulnerabilities to exploit as opposed to launching attacks drawn randomly from a pool of exploits for all vulnerabilities. (46,47,103) Capturing these aspects may require to integrate socioeconomic models to evaluate attacker's incentives in marketing or buying a new vulnerability (91,102) or choosing a target. (89) We consider these aspects for future work.…”
Section: Discussionmentioning
confidence: 99%
“…Similar to other software, Android vendors maintain the security of their devices by developing and issuing patches regularly. Nappa et al [27] studied the vulnerabilities life cycle in client applications, and Li and Paxson [22] investigated the patch development life cycle in open source software projects. The issues of automatic updates and semi-automatic updates have been investigated in [10] and [24], respectively.…”
Section: Related Workmentioning
confidence: 99%
“…To sketch a trade-off model that would allow to perform a retrospective analysis for "global" security maintenance of the whole FOSS component, we attempt to generalize the above "local" decision support. Similarly to Nappa et al [49], who employed survival analysis to analyze the time after a security patch is applied to a vulnerable host, we used it to analyze the persistence of vulnerable coding that we extracted from the sample of FOSS projects (shown in Table 2) with our screening tests. Survival analysis is the field of statistics that analyzes the expected duration of time before an event of interest occurs [50], and is being widely used in biological and medical studies.…”
Section: Decision Support For Security Mainte-nancementioning
confidence: 99%