Using Software Structure to Predict Vulnerability Exploitation Potential

@article{Younis2014UsingSS,
  title={Using Software Structure to Predict Vulnerability Exploitation Potential},
  author={Awad A. Younis and Yashwant K. Malaiya},
  journal={2014 IEEE Eighth International Conference on Software Security and Reliability-Companion},
  year={2014},
  pages={13-18}
}
Most of the attacks on computer systems are due to the presence of vulnerabilities in software. Recent trends show that number of newly discovered vulnerabilities still continue to be significant. Studies have also shown that the time gap between the vulnerability public disclosure and the release of an automated exploit is getting smaller. Therefore, assessing vulnerabilities exploitability risk is critical as it aids decision-makers prioritize among vulnerabilities, allocate resources, and… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 26 REFERENCES

Improving Software Security by Identifying and Securing Paths Linking Attack Surface to Attack Target

  • D. Brenneman
  • McCabe Software Inc., White Paper, Apr. .
  • 2012
1 Excerpt

Similar Papers

Loading similar papers…