Abstract
As more people use IT products, the application extent of software has increased along with demand for it. In addition to commercialized software, open source software is also seeing its market grow rapidly. But open source software is developed by those without expert knowledge in security. As a result, many security vulnerabilities arise and are taken advantage of for attacks. Therefore, in this paper, we suggested the design of an exploitable automatic verification system for secure open source software to address these issues. It is expected that, through the use of this system, the reliabilities of the open source software, the developers of the open source software, and the corporations using can be improved.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bodhani, A.: Feeling lucky [cybersecurity]. Engineering & Technology 10(1), 44–47 (2015)
Korea OSS Promotion Forum. Business Guide of Open Software (2014)
Cothey, V.: Web-crawling reliability. Journal of the American Society for Information Science and Technology 55(14), 1228–1238 (2004)
Patton, R.: Software testing. Sams Pub. (2006)
CWE - Common Weakness Enumeration. http://cwe.mitre.org
CWE/SANS Top 25 Most Dangerous Programming Errors (2011). http://cwe.mitre.org/top25/
CVE - Common Vulnerabilities and Exposures. http://cve.mitre.org
Mell, P., Scarfone, K., Romanosky, S.: Common vulnerability scoring system. IEEE Security & Privacy 4(6), 85–89 (2006)
CAPEC - Common Attack Pattern Enumeration and Classification. http://capec.mitre.org
Barnum, S.: Common attack pattern enumeration and classification (capec) schema description. Cigital Inc., http://capec.mitre.org/documents/documentation/CAPEC_Schema_Description_v1 3 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kim, B., Song, Jh., Park, JP., Jun, Ms. (2015). Design of Exploitable Automatic Verification System for Secure Open Source Software. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_40
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)