Using Software Reliability Models for Security Assessment - Verification of Assumptions

被引:0
|
作者
Lee, Da Young [1 ]
Vouk, Mladen [1 ]
Williams, Laurie [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Can software reliability models be used to assess software security? One of the issues is that security problems are relatively rare under "normal" operational profiles, while "classical" reliability models may not be suitable for use in attack conditions. We investigated a range of Fedora open source software security problems to see if some of the basic assumptions behind software reliability growth models hold for discovery of security problems in non-attack situations. We find that in some cases, under "normal" operational use, security problem detection process may be described as a Poisson process. In those cases, we can use appropriate classical software reliability growth models to assess "security reliability" of that software in non-attack situations.
引用
收藏
页码:23 / 24
页数:2
相关论文
共 50 条
  • [41] Scalable Security Verification of Software at Compile Time
    Tlili, Syrine
    Fernandez, Jose M.
    Belghith, Abdelfettah
    Dridi, Bilel
    Hidouri, Soufien
    2014 14TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2014), 2014, : 115 - 124
  • [42] Moderator factors of software security and performance verification
    Ribeiro, Victor Vidigal
    Cruzes, Daniela Soares
    Travassos, Guilherme Horta
    JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 184
  • [43] A Perception of the Practice of Software Security and Performance Verification
    Ribeiro, Victor Vidigal
    Cruzes, Daniela Soares
    Travassos, Guilherme Horta
    2018 25TH AUSTRALASIAN SOFTWARE ENGINEERING CONFERENCE (ASWEC), 2018, : 71 - 80
  • [44] IMPROVED SOFTWARE RELIABILITY THROUGH REQUIREMENTS VERIFICATION
    FISCHER, KF
    WALKER, MG
    IEEE TRANSACTIONS ON RELIABILITY, 1979, 28 (03) : 233 - 240
  • [45] Assessment of Bias Assumptions for Climate Models
    Kerkhoff, Christian
    Kuensch, Hans R.
    Schaer, Christoph
    JOURNAL OF CLIMATE, 2014, 27 (17) : 6799 - 6818
  • [46] Using trust assumptions with security requirements
    Charles B. Haley
    Robin C. Laney
    Jonathan D. Moffett
    Bashar Nuseibeh
    Requirements Engineering, 2006, 11 : 138 - 151
  • [47] Using trust assumptions with security requirements
    Haley, CB
    Laney, RC
    Moffett, JD
    Nuseibeh, B
    REQUIREMENTS ENGINEERING, 2006, 11 (02) : 138 - 151
  • [48] Restoring security of evolving software models using graph transformation
    Jens Bürger
    Jan Jürjens
    Sven Wenzel
    International Journal on Software Tools for Technology Transfer, 2015, 17 : 267 - 289
  • [49] Analysis of Software Reliability Models for Reliability Estimation
    Gupta, Aakash
    Gupta, Neeraj
    Garg, Rakesh
    Kumar, Ramesh
    2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 355 - 358
  • [50] INVESTIGATION OF SOFTWARE RELIABILITY MODELS
    SUKERT, AN
    PROCEEDINGS ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 1977, (NSYM): : 478 - 484