An Approach to Cognitive Root Cause Analysis of Software Vulnerabilities

被引:0
|
作者
Hytopoulos, Theo [1 ]
Chan, Marvin [1 ]
Roth, Keegan [1 ]
Wasson, Rylan [1 ]
Huang, Fuqun [1 ]
机构
[1] Western Washington Univ, Bellingham, WA 98225 USA
关键词
Root cause analysis; Software vulnerability; Cognitive analysis; Human error; Software process improvement; AGREEMENT; TAXONOMY;
D O I
10.1007/978-3-031-78386-9_2
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Understanding the root causes of software vulnerabilities is crucial for designing and implementing preventative measures. Given that software development is inherently a human activity, developers' cognitive errors stand out as a significant contributor to software vulnerabilities. While existing studies on vulnerability analysis focus on software faults associated with vulnerabilities or types of vulnerabilities, there exists a gap in understanding how software vulnerabilities stem from developers cognitive errors. This paper proposes a novel method, Cognitive Analysis for Software Vulnerabilities (CASV), aimed at identifying the cognitive mechanisms of how software vulnerabilities are introduced by software developers. CASV includes a set of cognitive patterns established in psychology and a modeling approach to bridge the gaps between patterns and software development contexts. Two empirical studies conducted to apply and assess the CASV method. The studies involved four analysts performing root cause analysis on 152 software vulnerabilities. The results indicate that CASV was able to explain the cognitive mechanisms behind 70% (106 out of the 152) software vulnerabilities. Furthermore, CASV significantly improves the reliability of vulnerability root cause analysis. It achieved an agreement level of 0.63 among four analysts within the range of Substantial Agreement, compared to 0.29 when using a root cause taxonomy. The implications of this study are far-reaching, particularly in terms of raising developers' awareness and enhancing their cognitive skills to proactively prevent software vulnerabilities.
引用
收藏
页码:11 / 26
页数:16
相关论文
共 50 条
  • [1] A cause-based approach to preventing software vulnerabilities
    Byers, David
    Shahmehri, Nahid
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 276 - +
  • [2] A software fault prevention approach in coding and root cause analysis
    Yu, WD
    BELL LABS TECHNICAL JOURNAL, 1998, 3 (02) : 3 - 21
  • [3] Modeling software vulnerabilities with vulnerability cause graphs
    Byers, David
    Ardi, Shanai
    Shahmehri, Nahid
    Duma, Claudiu
    ICSM 2006: 22ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2006, : 411 - +
  • [4] Patient safety - Incorporating drawing software into root cause analysis software
    Williams, L
    Grayson, D
    Gosbee, G
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2002, 9 (06) : S52 - S53
  • [5] Patient safety - Incorporating drawing software into Root Cause Analysis software
    Williams, L
    Grayson, D
    Gosbee, J
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2001, : 1059 - 1059
  • [6] A Survey of Automated Root Cause Analysis of Software Vulnerability
    Jurn, JeeSoo
    Kim, Taeeun
    Kim, Hwankuk
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 756 - 761
  • [7] Analysis of software structure vulnerabilities
    Information and Computer Engineering Institute of Northeast Forestry University, Harbin, Heilongjiang 150040, China
    不详
    不详
    不详
    不详
    Tien Tzu Hsueh Pao, 2009, 11 (2403-2408):
  • [8] A field study on root cause analysis of defects in space software
    Silva, Nuno
    Cunha, Joao Carlos
    Vieira, Marco
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2017, 158 : 213 - 229
  • [9] Root Cause Analysis of Software Aging in Critical Information Infrastructure
    Koenig, Philip
    Obermann, Fabian
    Mallinger, Kevin
    Schatten, Alexander
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2022, 2023, 13723 : 3 - 8
  • [10] An automated approach for identifying potential vulnerabilities in software
    Ghosh, AK
    O'Connor, T
    McGraw, G
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 104 - 114