Analysis of vulnerability fixing process in the presence of incorrect patches

被引:2
|
作者
Anjum, Misbah [1 ]
Singhal, Shakshi [2 ]
Kapur, P. K. [3 ]
Khatri, Sunil Kumar [4 ]
Panwar, Saurabh [5 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, Uttar Pradesh, India
[2] Fortune Inst Int Business, New Delhi, India
[3] Amity Univ, Amity Ctr Interdisciplinary Res, Noida, Uttar Pradesh, India
[4] Amity Univ Tashkent, Tashkent, Uzbekistan
[5] Univ Delhi, Dept Operat Res, Delhi, India
关键词
Software vulnerabilities; Security bugs; Patch correctness; Intrusion detection; Patch management; SECURITY; TIME; GENERATION;
D O I
10.1016/j.jss.2022.111525
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software vulnerabilities or security breaches can have consequences like leakage of sensitive informa-tion and malware execution, which are critical to network security. Consequently, eliminating security loopholes and vulnerabilities is imperative for the system administrator to counteract security attacks. Software should be thoroughly reviewed before it is released to uncover these security invasions. However, it is not feasible to identify and overcome all software failures during software testing due to external instances of software development, implementation costs, execution time, and unanticipated modifications to the specification. Security patching is a viable solution for such software systems to prevent attackers from exploiting existing vulnerabilities. Even after patch distribution and installation, it is crucial to determine whether the patch has effectively eliminated the vulnerability. Incorrect patches may lead to new security bugs, which may be malicious and disastrous for developing businesses and users. The present research aims to model the trend of patched vulnerabilities methodically by incorporating the generation of new vulnerabilities due to unsuccessful updations and encompassed bug fixes. The proposed analytical model is validated on the vulnerability databases obtained from the Common Vulnerabilities and Exposures repository. The empirical analysis yields that the present research has better forecasting efficacy than the benchmark studies.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges
    Canfora G.
    Di Sorbo A.
    Forootani S.
    Pirozzi A.
    Visaggio C.A.
    Computers and Security, 2020, 99
  • [2] Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges
    Canfora, Gerardo
    Di Sorbo, Andrea
    Forootani, Sara
    Pirozzi, Antonio
    Visaggio, Corrado Aaron
    COMPUTERS & SECURITY, 2020, 99
  • [3] The importance of fixing onlay patches
    Arthur I. Gilbert
    Hernia, 2003, 7 (4) : 171 - 171
  • [4] Identifying Linux Bug Fixing Patches
    Tian, Yuan
    Lawall, Julia
    Lo, David
    2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 386 - 396
  • [5] Vulnerability Analysis and Patches Management using Secure Mobile Agents
    Stirparo, Pasquale
    Shibli, Muhammad Awais
    Muftic, Sead
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1054 - 1058
  • [6] Analysis and detection of an incorrect profile shape in a classical scatterometric process
    Fawzi, Zaki Sabit
    Robert, Stephane
    El Kalyoubi, Ismail
    Bayard, Bernard
    EUROPEAN PHYSICAL JOURNAL-APPLIED PHYSICS, 2016, 76 (03):
  • [7] Prioritizing vulnerability patches in large networks
    Olswang, Amir
    Gonda, Tom
    Puzis, Rami
    Shani, Guy
    Shapira, Bracha
    Tractinsky, Noam
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 193
  • [8] Identifying Incorrect Patches in Program Repair Based on Meaning of Source Code
    Quang-Ngoc Phung
    Kim, Misoo
    Lee, Eunseok
    IEEE ACCESS, 2022, 10 : 12012 - 12030
  • [9] Incorrect analysis of data leads to incorrect conclusions
    Jean-François Hardy
    Sylvain Bélisle
    Normand Gravel
    Canadian Journal of Anaesthesia, 1997, 44 (7)
  • [10] Modeling Vulnerability Discovery and Patching with Fixing Lag
    Shrivastava, A. K.
    Sharma, Ruchi
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 569 - 578