SOFTWARE VULNERABILITIES INTEGRATED MANAGEMENT SYSTEM

被引:0
|
作者
Aldea, Madalina [1 ]
Gheorghica, Daniel [1 ]
Croitoru, Victor [2 ]
机构
[1] Kapsch SRL, Bucharest, Romania
[2] UPB, Bucharest, Romania
关键词
Software vulnerability; Vulnerability scanning; Prevention Methods; Detection Methods; Vulnerability management;
D O I
10.1109/comm48946.2020.9141970
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In simple terms, a vulnerability can be an error or a flaw in code design which can determine malfunction of an application. Software vulnerabilities are the main cause of computer security problems. In order to avoid an attack or to minimize the damages produced by a cyberattack, a good vulnerability management plan should be implemented. This paper proposes a solution for vulnerability management by implementing a software vulnerabilities integrated management system (SV-IMS) that can perform security test in order to detect software vulnerabilities, the results of vulnerability tests being processed and viewed using a dedicated platform. The SV-IMS has a dedicated database for configuration management.
引用
收藏
页码:97 / 102
页数:6
相关论文
共 50 条
  • [21] A Software Solution for Hardware Vulnerabilities
    Dharsee, Komail
    Johnson, Ethan
    Criswell, John
    2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 27 - 33
  • [22] Discovering vulnerabilities in control system human-machine interface software
    McGrew, Robert Wesley
    Vaughn, Rayford B.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (04) : 583 - 589
  • [23] Labeling Software Security Vulnerabilities
    Bojanova, Irena
    Guerrerio, John J.
    IT PROFESSIONAL, 2023, 25 (05) : 64 - 70
  • [24] Automated Characterization of Software Vulnerabilities
    Gonzalez, Danielle
    Hastings, Holly
    Mirakhorli, Mehdi
    2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), 2019, : 135 - 139
  • [25] Ada and the software vulnerabilities project
    Burns, Alan
    Tokar, Joyce L.
    Baird, Stephen
    Barnes, John
    Chapman, Rod
    Dismukes, Gary
    González-Harbour, Michael
    Michell, Stephen
    Moore, Brad
    Pinho, Luís Miguel
    Ploedereder, Erhard
    Real, Jorge
    Rosen, J.P.
    Schonberg, Ed.
    Tucker Taft, S.
    Vardanega, T.
    Ada User Journal, 2010, 31 (03): : 191 - 215
  • [26] Analysis of software structure vulnerabilities
    Information and Computer Engineering Institute of Northeast Forestry University, Harbin, Heilongjiang 150040, China
    不详
    不详
    不详
    不详
    Tien Tzu Hsueh Pao, 2009, 11 (2403-2408):
  • [27] Assisted Discovery of Software Vulnerabilities
    Munaiah, Nuthan
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 464 - 467
  • [28] Software Vulnerabilities Precluded by SPARK
    Tokar, Joyce L.
    Jones, F. David
    Black, Paul E.
    Dupilka, Chris E.
    SIGADA 2011: PROCEEDINGS OF THE 2011 ACM INTERNATIONAL CONFERENCE ON ADA AND RELATED TECHNOLOGIES, 2011, : 39 - 46
  • [29] SOFTWARE COMMUNICATIONS INTEGRATED INTO REFINERY SYSTEM
    GOODPASTER, R
    KENNEDY, JP
    OIL & GAS JOURNAL, 1989, 87 (03) : 53 - 59
  • [30] On mining computer integrated software system
    Luo, SH
    Zhang, LQ
    Xu, XH
    Zhou, JD
    MINING SCIENCE AND TECHNOLOGY, 1996, : 73 - 76