An Approach to Cognitive Root Cause Analysis of Software Vulnerabilities

被引:0
|
作者
Hytopoulos, Theo [1 ]
Chan, Marvin [1 ]
Roth, Keegan [1 ]
Wasson, Rylan [1 ]
Huang, Fuqun [1 ]
机构
[1] Western Washington Univ, Bellingham, WA 98225 USA
关键词
Root cause analysis; Software vulnerability; Cognitive analysis; Human error; Software process improvement; AGREEMENT; TAXONOMY;
D O I
10.1007/978-3-031-78386-9_2
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Understanding the root causes of software vulnerabilities is crucial for designing and implementing preventative measures. Given that software development is inherently a human activity, developers' cognitive errors stand out as a significant contributor to software vulnerabilities. While existing studies on vulnerability analysis focus on software faults associated with vulnerabilities or types of vulnerabilities, there exists a gap in understanding how software vulnerabilities stem from developers cognitive errors. This paper proposes a novel method, Cognitive Analysis for Software Vulnerabilities (CASV), aimed at identifying the cognitive mechanisms of how software vulnerabilities are introduced by software developers. CASV includes a set of cognitive patterns established in psychology and a modeling approach to bridge the gaps between patterns and software development contexts. Two empirical studies conducted to apply and assess the CASV method. The studies involved four analysts performing root cause analysis on 152 software vulnerabilities. The results indicate that CASV was able to explain the cognitive mechanisms behind 70% (106 out of the 152) software vulnerabilities. Furthermore, CASV significantly improves the reliability of vulnerability root cause analysis. It achieved an agreement level of 0.63 among four analysts within the range of Substantial Agreement, compared to 0.29 when using a root cause taxonomy. The implications of this study are far-reaching, particularly in terms of raising developers' awareness and enhancing their cognitive skills to proactively prevent software vulnerabilities.
引用
收藏
页码:11 / 26
页数:16
相关论文
共 50 条
  • [41] A New Approach to Locate Software Vulnerabilities Using Code Metrics
    Zagane, Mohammed
    Abdi, Mustapha Kamel
    Alenezi, Mamdouh
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2020, 8 (03) : 82 - 95
  • [42] Root Cause Approach to Prisoner Radicalisation
    Thompson, Nathan
    SALUS JOURNAL, 2016, 4 (03) : 18 - 33
  • [43] A software security assessment system based on analysis of vulnerabilities
    Sui, Chenmeng
    Liu, Yanzhao
    Liu, Yun
    Journal of Convergence Information Technology, 2012, 7 (06) : 211 - 219
  • [44] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Carlos M. Mejía-Granda
    José L. Fernández-Alemán
    Juan M. Carrillo-de-Gea
    José A. García-Berná
    Medical & Biological Engineering & Computing, 2024, 62 : 257 - 273
  • [45] Analysis of Vulnerabilities in Satellite Software Bus Network Architecture
    Schalk, Adrian
    Brodnik, Luke
    Brown, Dane
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [46] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Mejia-Granda, Carlos M.
    Fernandez-Aleman, Jose L.
    Carrillo-de-Gea, Juan M.
    Garcia-Berna, Jose A.
    MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2024, 62 (01) : 257 - 273
  • [47] Detecting Software Vulnerabilities in Android Using Static Analysis
    Dhaya, R.
    Poongodi, M.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 915 - 918
  • [48] Analysis of Software Vulnerabilities Using Machine Learning Techniques
    Diako, Doffou Jerome
    Achiepo, Odilon Yapo M.
    Mensah, Edoete Patrice
    E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2019), 2020, 311 : 30 - 37
  • [49] Monitoring Software Vulnerabilities through Social Networks Analysis
    Trabelsi, Slim
    Plate, Henrik
    Abida, Amine
    Ben Aoun, M. Marouane
    Zouaoui, Anis
    Missaoui, Chedy
    Gharbi, Sofien
    Ayari, Alaeddine
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 236 - 242
  • [50] The principles of root cause analysis
    Surkitt-Parr, Michael
    JOURNAL OF MEDICAL GENETICS, 2006, 43 : S30 - S30