Taxonomies of attacks and vulnerabilities in computer systems
VM Igure, RD Williams - IEEE Communications Surveys & …, 2008 - ieeexplore.ieee.org
Security assessment of a system is a difficult problem. Most of the current efforts in security
assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still …
assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still …
Software vulnerability discovery techniques: A survey
B Liu, L Shi, Z Cai, M Li - 2012 fourth international conference …, 2012 - ieeexplore.ieee.org
Software vulnerabilities are the root cause of computer security problem. How people can
quickly discover vulnerabilities existing in a certain software has always been the focus of …
quickly discover vulnerabilities existing in a certain software has always been the focus of …
An empirical study on using the national vulnerability database to predict software vulnerabilities
Software vulnerabilities represent a major cause of cyber-security problems. The National
Vulnerability Database (NVD) is a public data source that maintains standardized …
Vulnerability Database (NVD) is a public data source that maintains standardized …
Application of vulnerability discovery models to major operating systems
OH Alhazmi, YK Malaiya - IEEE Transactions on Reliability, 2008 - ieeexplore.ieee.org
A number of security vulnerabilities have been reported in the Windows, and Linux
operating systems. Both the developers, and users of operating systems have to utilize …
operating systems. Both the developers, and users of operating systems have to utilize …
Modeling the vulnerability discovery process
OH Alhazmi, YK Malaiya - 16th IEEE International Symposium …, 2005 - ieeexplore.ieee.org
Security vulnerabilities in servers and operating systems are software defects that represent
great risks. Both software developers and users are struggling to contain the risk posed by …
great risks. Both software developers and users are struggling to contain the risk posed by …
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots
D Oliveira, M Rosenthal, N Morin, KC Yeh… - Proceedings of the 30th …, 2014 - dl.acm.org
Despite the security community's emphasis on the importance of building secure software,
the number of new vulnerabilities found in our systems is increasing. In addition …
the number of new vulnerabilities found in our systems is increasing. In addition …
Predicting cyber risks through national vulnerability database
Software vulnerabilities are the major cause of cyber security problems. The National
Vulnerability Database (NVD) is a public data source that maintains standardized …
Vulnerability Database (NVD) is a public data source that maintains standardized …
Multiservice network security metric
This report proposes a new approach to determination of security complex metric. Such
approach allows to obtain a quantitative assess based on network security recorded …
approach allows to obtain a quantitative assess based on network security recorded …
Improving vulnerability discovery models
A Ozment - Proceedings of the 2007 ACM workshop on Quality of …, 2007 - dl.acm.org
Security researchers are applying software reliability models to vulnerability data, in an
attempt to model the vulnerability discovery process. I show that most current work on these …
attempt to model the vulnerability discovery process. I show that most current work on these …
Vulnerability scrying method for software vulnerability discovery prediction without a vulnerability database
Predicting software vulnerability discovery trends can help improve secure deployment of
software applications and facilitate backup provisioning, disaster recovery, diversity …
software applications and facilitate backup provisioning, disaster recovery, diversity …