메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Predicting vulnerable software components with dependency graphs

Author keywords

prediction; vulnerability

Indexed keywords

CODE METRICS; COMPLEXITY METRICS; DEPENDENCY GRAPHS; EMPIRICAL RESULTS; FIREFOX; JAVASCRIPT; PREDICTION; PREDICTION MODEL; RECALL RATE; SECURITY METRICS; SOFTWARE COMPONENT; SOFTWARE SECURITY; VULNERABILITY;

EID: 78649393441     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1853919.1853923     Document Type: Conference Paper
Times cited : (95)

References (24)
  • 1
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard - An economic perspective
    • R. Anderson. Why information security is hard - an economic perspective. In Proc. of ACSAC'01, 2001.
    • Proc. of ACSAC'01, 2001
    • Anderson, R.1
  • 2
    • 60249092995 scopus 로고    scopus 로고
    • A systematic review of software fault prediction studies
    • C. Catal and B. Diri. A systematic review of software fault prediction studies. Expert Sys. with App., 36(4):7346-7354, 2009.
    • (2009) Expert Sys. with App. , vol.36 , Issue.4 , pp. 7346-7354
    • Catal, C.1    Diri, B.2
  • 3
    • 78649401190 scopus 로고    scopus 로고
    • Using complexity, coupling, and cohesion metrics as early predictors of vul
    • I. Chowdhury and M. Zulkernine. Using complexity, coupling, and cohesion metrics as early predictors of vul. J. of Soft. Arch., 2010.
    • (2010) J. of Soft. Arch.
    • Chowdhury, I.1    Zulkernine, M.2
  • 6
    • 67249159318 scopus 로고    scopus 로고
    • Ranking attack-prone components with a predictive model
    • M. Gegick and L. Williams. Ranking attack-prone components with a predictive model. In Proc. of ISSRE'08, pages 315-316, 2008.
    • (2008) Proc. of ISSRE'08 , pp. 315-316
    • Gegick, M.1    Williams, L.2
  • 7
    • 70349244714 scopus 로고    scopus 로고
    • Prioritizing software security fortification throughcode-level metrics
    • ACM
    • M. Gegick, L. Williams, J. Osborne, and M. Vouk. Prioritizing software security fortification throughcode-level metrics. In Proc. of QoP'08, pages 31-38. ACM, 2008.
    • (2008) Proc. of QoP'08 , pp. 31-38
    • Gegick, M.1    Williams, L.2    Osborne, J.3    Vouk, M.4
  • 8
    • 57049102518 scopus 로고    scopus 로고
    • Comparing design and code metrics for software quality prediction
    • ACM
    • Y. Jiang, B. Cuki, T. Menzies, and N. Bartlow. Comparing design and code metrics for software quality prediction. In Proc. of PROMISE'08, pages 11-18. ACM, 2008.
    • (2008) Proc. of PROMISE'08 , pp. 11-18
    • Jiang, Y.1    Cuki, B.2    Menzies, T.3    Bartlow, N.4
  • 9
    • 78649402467 scopus 로고    scopus 로고
    • Which is the right source for vulnerabilities studies? an empirical analysis on mozilla firefox
    • F. Massacci and V. H. Nguyen. Which is the right source for vulnerabilities studies? an empirical analysis on mozilla firefox. In Proc. of MetriSec'10, 2010.
    • Proc. of MetriSec'10, 2010
    • Massacci, F.1    Nguyen, V.H.2
  • 10
    • 33845782503 scopus 로고    scopus 로고
    • Data mining static code attributes to learn defect predictors
    • T. Menzies, J. Greenwald, and A. Frank. Data mining static code attributes to learn defect predictors. TSE, 33(9):2-13, 2007.
    • (2007) TSE , vol.33 , Issue.9 , pp. 2-13
    • Menzies, T.1    Greenwald, J.2    Frank, A.3
  • 11
    • 33244463047 scopus 로고    scopus 로고
    • Use of relative code churn measures to predict system defect density
    • N. Nagappan and T. Ball. Use of relative code churn measures to predict system defect density. In Proc. of ICSE'05, pages 284-292, 2005.
    • (2005) Proc. of ICSE'05 , pp. 284-292
    • Nagappan, N.1    Ball, T.2
  • 13
    • 34248659137 scopus 로고    scopus 로고
    • Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes
    • H. M. Olague, S. Gholston, and S. Quattlebaum. Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes. TSE, 33(6):402-419, 2007.
    • (2007) TSE , vol.33 , Issue.6 , pp. 402-419
    • Olague, H.M.1    Gholston, S.2    Quattlebaum, S.3
  • 17
    • 62949190483 scopus 로고    scopus 로고
    • An empirical model to predict security vulnerabilities using code complexity metrics
    • Y. Shin and L. Williams. An empirical model to predict security vulnerabilities using code complexity metrics. In Proc. of ESEM'08, 2008.
    • Proc. of ESEM'08, 2008.
    • Shin, Y.1    Williams, L.2
  • 18
    • 70349263324 scopus 로고    scopus 로고
    • Is complexity really the enemy of software security?
    • Y. Shin and L. Williams. Is complexity really the enemy of software security? In Proc. of QoP'08, pages 47-50, 2008.
    • (2008) Proc. of QoP'08 , pp. 47-50
    • Shin, Y.1    Williams, L.2
  • 19
    • 34548388395 scopus 로고    scopus 로고
    • Office for Research Development and Education, version 1.1.23-r6.
    • Wessa. P. (2010), Free Statistics Software, Office for Research Development and Education, version 1.1.23-r6. http://www.wessa.net/.
    • (2010) Free Statistics Software
    • Wessa, P.1
  • 20
    • 34548253429 scopus 로고    scopus 로고
    • Comments on data mining static code attributes to learn defect predictors
    • H. Zhang and X. Zhang. Comments on data mining static code attributes to learn defect predictors. TSE, 33(9):635-637, 2007.
    • (2007) TSE , vol.33 , Issue.9 , pp. 635-637
    • Zhang, H.1    Zhang, X.2
  • 21
    • 50049132401 scopus 로고    scopus 로고
    • Predicting defective software components from code complexity measures
    • H. Zhang, X. Zhang, and M. Gu. Predicting defective software components from code complexity measures. In Procc. of PRDC'07, pages 93-96, 2007.
    • (2007) Procc. of PRDC'07 , pp. 93-96
    • Zhang, H.1    Zhang, X.2    Gu, M.3
  • 23


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.