Skip to main content

A Framework for Vulnerability Analysis during Software Maintenance

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 169))

Abstract

Need of vulnerability analysis during software maintenance has been highly stressed by many vulnerability response experts. An analysis of why and how vulnerability happened is crucial for developing appropriate countermeasures to prevent recurrence of the vulnerabilities. In this paper, we present a framework for vulnerability analysis which needs to be applied during software maintenance. The framework helps in better and efficient cause-detection, identification of reasons of the breaches and development of countermeasures for already existing as well as new vulnerabilities.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Viega, J., McGraw, G.: Building Secure Software. Addition Wesley, Reading (2005)

    Google Scholar 

  2. SANS, http://www.sans.org/

  3. Common Weakness Enumeration, http://www.cwe.mitre.org

  4. Common Vulnerability Scoring System, http://www.first.org.cvss

  5. Ray, I., Nayot, P.: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. In: di Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 231–246. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Byers, D., Shahmehri, N.: A Cause-Based Approach to Preventing Software Vulnerabilities. In: The Third International Conference on Availability, Reliability and Security, pp. 276–283 (2008)

    Google Scholar 

  7. Kloos, J., Elberzgager, F., Eschbach, R.: Systmatic Construction of Goal Indicator Trees for Indicator-Based Dependability Inspections. In: 36th Conference on Software Engineering and Advanced Applications (SEAA), pp. 279–282 (2010)

    Google Scholar 

  8. Byers, D., Shahmehri, N.: Unified modeling of attacks, vulnerabilities and security Activities. In: Workshop on Software Engineering for Secure Systems (SESS). ACM, Cape Town (2010)

    Google Scholar 

  9. Incident handling analysis CERT/CSIRT style Hand-on training. Cyber Security Malaysia (2010)

    Google Scholar 

  10. Byers, D., Ardi, S., Shahmehri, N., Duma, C.: Modeling Software Vulnerabilities With Vulnerability Cause Graphs. In: 22nd IEEE International Conference on Software Maintenance, pp. 411–422 (2006)

    Google Scholar 

  11. Ardi, S., Shahmehri, N.: A Post-Mortem Incident Modeling Method. International Conference on Availability, Reliability and Security, 1018–1023 (2009)

    Google Scholar 

  12. http://www.valvesoftware.com/games/

  13. http://www.cvedetails.com/cve-details/

  14. Mell, M., Scarfone, K., Romanosky, S.: Common Vulnerability Scoring System. IEEE Security & Privacy 4, 85–89 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chhabra, J.K., Prajapati, A. (2011). A Framework for Vulnerability Analysis during Software Maintenance. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22577-2_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22576-5

  • Online ISBN: 978-3-642-22577-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics