Patching zero-day vulnerabilities: an empirical analysis

被引:10
|
作者
Roumani, Yaman [1 ]
机构
[1] Oakland Univ, Dept Decis & Informat Sci, 275 Varner Dr, Rochester, MI 48309 USA
来源
JOURNAL OF CYBERSECURITY | 2021年 / 7卷 / 01期
关键词
zero-day vulnerability; patch release time; survival analysis; vulnerability; attributes; SOFTWARE VENDORS; SECURITY; INFORMATION; MANAGEMENT; RELEASE; TIME; SYSTEMS; IMPACT; POLICY; RISKS;
D O I
10.1093/cybsec/tyab023
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Zero-day vulnerabilities remain one of the major security threats that are faced by organizations. Once a vendor learns about a zero-day vulnerability, releasing a timely patch becomes a priority given the risk of zero-day exploits. However, we still lack information on the factors that affect patch release time of such vulnerabilities. The main objective of this study is to examine the impact of other as-yet unexplored factors on the patch release time of zero-day vulnerabilities. Using zeroday vulnerability dataset captured between 2010 and 2020, we employ survival analysis technique. Our model explores the impact of vulnerability attack vector, attack complexity, privileges required, user interaction, scope, confidentiality, integrity, and availability impact on patch release timing. Findings show that a zero-day vulnerability is more likely to be patched on time if the vulnerability results in a scope change and affects more vendors, products, and versions. However, a zero-day vulnerability is less likely to be patched on time if it requires privileges and impacts confidentiality. Our sub-analyses also reveal how patch release times vary across different products and vulnerability types.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Benchmarking LLM for Zero-day Vulnerabilities
    Lisha, M.
    Agarwal, Vedika
    Kamthania, Supriya
    Vutkur, Pranav
    Chari, Madhusoodhana S.
    10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES, CONECCT 2024, 2024,
  • [2] Mitigation and Detection of Zero-Day Vulnerabilities
    Sebastian Guisao, Juan
    Toro Rendon, Juan Carlos
    CUADERNO ACTIVA, 2014, (06): : 63 - 67
  • [3] Observation of Recent Microsoft Zero-Day Vulnerabilities
    Evans, Nathaniel
    Yuan, Xiaohong
    PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 328 - 329
  • [4] A framework for zero-day vulnerabilities detection and prioritization
    Singh, Umesh Kumar
    Joshi, Chanchala
    Kanellopoulos, Dimitris
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 164 - 172
  • [5] An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities
    Albanese, Massimiliano
    Jajodia, Sushil
    Singhal, Anoop
    Wang, Lingyu
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 322 - 340
  • [6] An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities
    Albanese, Massimiliano
    Jajodia, Sushil
    Singhal, Anoop
    Wang, Lingyu
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 207 - 218
  • [7] Consensus Forecasting of Zero-Day Vulnerabilities for Network Security
    Last, David
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 290 - 297
  • [8] Preventing Zero-Day Exploits of Memory Vulnerabilities with Guard Lines
    Vinson, Sterling
    Stonehirsch, Rachel
    Coffman, Joel
    Stevens, Jim
    PROCEEDINGS OF THE 9TH SOFTWARE SECURITY, PROTECTION, AND REVERSE ENGINEERING WORKSHOP 2019 (SSPREW-9), 2019,
  • [9] Competition and patching of security vulnerabilities: An empirical analysis
    Arora, Ashish
    Forman, Chris
    Nandkumar, Anand
    Telang, Rahul
    INFORMATION ECONOMICS AND POLICY, 2010, 22 (02) : 164 - 177
  • [10] Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities
    Barros, Pedro H.
    Chagas, Eduarda T. C.
    Oliveira, Leonardo B.
    Queiroz, Fabiane
    Ramos, Heitor S.
    COMPUTERS & SECURITY, 2022, 120