【24h】

Predicting Vulnerable Software Components

机译:预测易受攻击的软件组件

获取原文

摘要

Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to components. The resulting ranking of the most vulnerable components is a perfect base for further investigations on what makes components vulnerable. In an investigation of the Mozilla vulnerability history, we surprisingly found that components that had a single vulnerability in the past were generally not likely to have further vulnerabilities. However, components that had similar imports or function calls were likely to be vulnerable. Based on this observation, we were able to extend Vulture by a simple predictor that correctly predicts about half of all vulnerable components, and about two thirds of all predictions are correct. This allows developers and project managers to focus their their efforts where it is needed most: "We should look at nsXPInstallManager because it is likely to contain yet unknown vulnerabilities."
机译:软件中大多数漏洞在哪里?我们的秃鹰工具会挖掘现有漏洞数据库和版本档案,以将漏洞映射到组件。由此产生的最脆弱的组件的排名是一个完美的基础,用于进一步调查使组件易受攻击的东西。在调查Mozilla漏洞历史中,我们惊奇地发现,过去的单一漏洞的组件通常不太可能具有进一步的漏洞。但是,具有相似导入或函数调用的组件可能很容易受到攻击。基于此观察,我们能够通过一个简单的预测器延伸秃鹰,该预测器正确地预测大约一半的易受攻击的组件,大约三分之二的预测是正确的。这允许开发人员和项目经理聚焦他们最需要的努力:“我们应该看看NSXpinstallManager,因为它可能包含尚未包含未知的漏洞。”

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号