首页> 外文学位 >A Study of Software Security Problem Disclosure, Correction and Patching Processes.
【24h】

A Study of Software Security Problem Disclosure, Correction and Patching Processes.

机译:关于软件安全问题的披露,纠正和修补过程的研究。

获取原文
获取原文并翻译 | 示例

摘要

Quantitative analysis of software security problems plays an important role in understanding software security. Information on how and when software security problems are disclosed, exploited in the field, fixed by developers and patched by users, is often analysed from a calendar time perspective. This provides worst-case assessment and effort-to-fix information, but is not directly related to actual operational impact of the discovered problems. Given that security problems are a subset of the more general category of software problems, employing usage metrics typically found in classical software reliability engineering, such as inservice time, appears to be a reasonable approach for assessing security problems. The main goal of this thesis is to investigate operational software security problem disclosure, correction and patching processes through publicly available information, and through that improve our understanding of of the issues, as well as enable better process and defense planning and related decision making.;One of the issues one runs into almost immediately when studying open software security data is the distributed nature and diversity of such data. The data reside in numerous data bases, in different formats, and it is a challenge to collect that information. The first step in the current work was to develop a set of tools for automated collection of linked information across public repositories. Investigated were products that follow a process of full disclosure of security problems before fixes are available (we call them "full disclosure" products), and those that disclose security problems along with fixes and possibly only limited information about them (we call them "limited disclosure" products). To analyse and understand collected information, a comprehensive security problem response model was developed that describes interactions of events associated with users, developers, attackers, software security problems, and fixes. The model captures the states through which a software may go based on the discovery, disclosure, exploit, failure, and correction of security problems. The model distinguishes itself from published models by emphasizing roles and operational impact perspectives.;As part of the analyses, two sub-models are investigated for estimating the disclosure of unique security problems - the classical Logarithmic Poisson Execution Time (LPET) model, and a Bayesian model. The latter model was included to capture the subjective views of risk and exposure. Both models were found to work well - the LPET in the context of security problem rates across releases, and the Bayesian model in the context of disclosure of security problems per release.;In combination with experimental data, the overall model was also used to investigate security problem disclosure, correction and patching policies. Time to discovery, time-to-disclosure, time-to-intrusion, time-to-patch-availability, and time-to-patch-application are some of the metrics in this context. Empirical results tell us that between 30% and 80% of the reported problems will fail in the field only if end-users interact with the attack mechanism (e.g., opening a malicious attachment in an email). We classify such problems as "voluntary" security problems. Early warning/disclosure of such problems may help users in taking precautions. An interesting question is "Under what conditions is the policy of early disclosure of voluntary security problems a good one?". This is discussed from the perspectives where (a) users do not intervene in the installation of patches (we call it "automatic updates") and (b) where users do intervene (we call it "non-automatic updates"). For a given set of values of the process metrics under consideration, it is shown what percentage of users should heed the warning for the policy of early disclosure to be effective. Several other such policies are examined and discussed.
机译:对软件安全性问题的定量分析在理解软件安全性中起着重要作用。通常从日历时间角度分析有关如何以及何时披露,由开发人员修复,由用户修补的软件安全问题的披露方式和时间的信息。这提供了最坏情况的评估和修复工作的信息,但与发现的问题的实际操作影响没有直接关系。鉴于安全性问题是软件问题中较一般类别的子集,因此采用典型的软件可靠性工程中常见的使用度量(例如,服务时间)似乎是评估安全性问题的合理方法。本文的主要目的是通过公开获得的信息来研究运营软件安全性问题的披露,纠正和修补过程,从而增进我们对问题的理解,并实现更好的过程和防御计划以及相关决策。在研究开放软件安全性数据时,几乎立即会遇到的问题之一就是此类数据的分布式性质和多样性。数据以不同的格式存在于众多数据库中,因此收集这些信息是一项挑战。当前工作的第一步是开发一套工具,用于跨公共存储库自动收集链接信息。调查的产品遵循在修复程序可用之前全面披露安全问题的过程(我们称为“全面披露”产品),以及那些与修复程序一起披露安全问题以及可能仅包含有限信息的产品(我们称之为“有限”产品)披露”产品)。为了分析和理解收集的信息,开发了一个全面的安全问题响应模型,该模型描述了与用户,开发人员,攻击者,软件安全问题和修补程序相关的事件的交互。该模型基于安全问题的发现,公开,利用,故障和纠正来捕获软件运行所经过的状态。该模型通过强调角色和运营影响角度将自己与已发布的模型区分开来;作为分析的一部分,研究了两个子模型以估计独特安全问题的披露:经典对数泊松执行时间(LPET)模型和贝叶斯模型。包含了后一种模型,以捕获风险和暴露的主观观点。发现这两种模型都运行良好-在各个版本的安全性问题率方面是LPET,在每个版本的安全性问题是上下文中是贝叶斯模型。;结合实验数据,整个模型还用于调查安全问题的披露,纠正和修补策略。发现时间,披露时间,入侵时间,修补程序可用性时间和修补程序应用程序是此上下文中的一些指标。经验结果告诉我们,只有最终用户与攻击机制互动(例如,打开电子邮件中的恶意附件),才会有30%到80%的报告问题在现场失败。我们将此类问题归类为“自愿”安全问题。此类问题的早期警告/披露可能有助于用户采取预防措施。一个有趣的问题是“在什么条件下及早披露自愿安全问题的政策是一个好条件?”。从(a)用户不干预补丁程序的安装(我们称为“自动更新”)和(b)用户干预的地方(我们称为“非自动更新”)的角度进行了讨论。对于正在考虑的一组给定的过程度量值,将显示应注意警告的百分比的用户,以使早期披露策略生效。研究和讨论了其他几种此类策略。

著录项

  • 作者

    Anbalagan, Prasanth.;

  • 作者单位

    North Carolina State University.;

  • 授予单位 North Carolina State University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 114 p.
  • 总页数 114
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号