Skip to main content

Design of Exploitable Automatic Verification System for Secure Open Source Software

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 373))

Abstract

As more people use IT products, the application extent of software has increased along with demand for it. In addition to commercialized software, open source software is also seeing its market grow rapidly. But open source software is developed by those without expert knowledge in security. As a result, many security vulnerabilities arise and are taken advantage of for attacks. Therefore, in this paper, we suggested the design of an exploitable automatic verification system for secure open source software to address these issues. It is expected that, through the use of this system, the reliabilities of the open source software, the developers of the open source software, and the corporations using can be improved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bodhani, A.: Feeling lucky [cybersecurity]. Engineering & Technology 10(1), 44–47 (2015)

    Article  Google Scholar 

  2. Korea OSS Promotion Forum. Business Guide of Open Software (2014)

    Google Scholar 

  3. Cothey, V.: Web-crawling reliability. Journal of the American Society for Information Science and Technology 55(14), 1228–1238 (2004)

    Article  Google Scholar 

  4. Patton, R.: Software testing. Sams Pub. (2006)

    Google Scholar 

  5. CWE - Common Weakness Enumeration. http://cwe.mitre.org

  6. CWE/SANS Top 25 Most Dangerous Programming Errors (2011). http://cwe.mitre.org/top25/

  7. CVE - Common Vulnerabilities and Exposures. http://cve.mitre.org

  8. Mell, P., Scarfone, K., Romanosky, S.: Common vulnerability scoring system. IEEE Security & Privacy 4(6), 85–89 (2006)

    Article  Google Scholar 

  9. CAPEC - Common Attack Pattern Enumeration and Classification. http://capec.mitre.org

  10. Barnum, S.: Common attack pattern enumeration and classification (capec) schema description. Cigital Inc., http://capec.mitre.org/documents/documentation/CAPEC_Schema_Description_v1 3 (2008)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moon-seog Jun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kim, B., Song, Jh., Park, JP., Jun, Ms. (2015). Design of Exploitable Automatic Verification System for Secure Open Source Software. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0281-6_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0280-9

  • Online ISBN: 978-981-10-0281-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics