메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Which is the right source for vulnerability studies? An empirical analysis on Mozilla Firefox

Author keywords

[No Author keywords available]

Indexed keywords

DATA SOURCE; EMPIRICAL ANALYSIS; EMPIRICAL METHOD; EXPERIMENTAL DATA; FIREFOX; MOZILLA; SECURITY ASSESSMENT; SECURITY METRICES; VULNERABILITY DISCOVERY;

EID: 78649402467     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1853919.1853925     Document Type: Conference Paper
Times cited : (49)

References (30)
  • 1
    • 33750962700 scopus 로고    scopus 로고
    • Modeling the vulnerability discovery process
    • O. Alhazmi and Y. Malaiya. Modeling the vulnerability discovery process. In Proc. of ISSRE'05, pages 129-138, 2005.
    • (2005) Proc. of ISSRE'05 , pp. 129-138
    • Alhazmi, O.1    Malaiya, Y.2
  • 2
    • 41449117969 scopus 로고    scopus 로고
    • Application of vulnerability discovery models to major operating systems
    • O. Alhazmi and Y. Malaiya. Application of vulnerability discovery models to major operating systems. IEEE Trans. on Reliab., 57(1):14-22, 2008.
    • (2008) IEEE Trans. on Reliab. , vol.57 , Issue.1 , pp. 14-22
    • Alhazmi, O.1    Malaiya, Y.2
  • 3
    • 34248348339 scopus 로고    scopus 로고
    • Measuring, analyzing and predicting security vulnerabilities in software systems
    • DOI 10.1016/j.cose.2006.10.002, PII S0167404806001520
    • O. Alhazmi, Y. Malaiya, and I. Ray. Measuring, analyzing and predicting security vulnerabilities in software systems. Comp. & Sec., 26(3):219-228, 2007. (Pubitemid 46734415)
    • (2007) Computers and Security , vol.26 , Issue.3 , pp. 219-228
    • Alhazmi, O.H.1    Malaiya, Y.K.2    Ray, I.3
  • 5
    • 60249092995 scopus 로고    scopus 로고
    • A systematic review of software fault prediction studies
    • C. Catal and B. Diri. A systematic review of software fault prediction studies. Expert Sys. with App., 36(4):7346-7354, 2009.
    • (2009) Expert Sys. with App. , vol.36 , Issue.4 , pp. 7346-7354
    • Catal, C.1    Diri, B.2
  • 6
    • 78649401190 scopus 로고    scopus 로고
    • Using complexity, coupling, and cohesion metrics as early predictors of vul
    • I. Chowdhury and M. Zulkernine. Using complexity, coupling, and cohesion metrics as early predictors of vul. J. of Soft. Arch., 2010.
    • (2010) J. of Soft. Arch.
    • Chowdhury, I.1    Zulkernine, M.2
  • 8
    • 70350630478 scopus 로고    scopus 로고
    • Toward non-security failures as a predictor of security faults and failures
    • M. Gegick, P. Rotella, and L. Williams. Toward non-security failures as a predictor of security faults and failures. Eng. Secure Soft. and Sys., 5429:135-149, 2009.
    • (2009) Eng. Secure Soft. and Sys. , vol.5429 , pp. 135-149
    • Gegick, M.1    Rotella, P.2    Williams, L.3
  • 12
    • 57049102518 scopus 로고    scopus 로고
    • Comparing design and code metrics for software quality prediction
    • ACM
    • Y. Jiang, B. Cuki, T. Menzies, and N. Bartlow. Comparing design and code metrics for software quality prediction. In Proc. of PROMISE'08, pages 11-18. ACM, 2008.
    • (2008) Proc. of PROMISE'08 , pp. 11-18
    • Jiang, Y.1    Cuki, B.2    Menzies, T.3    Bartlow, N.4
  • 14
    • 74049133901 scopus 로고    scopus 로고
    • Secure open source collaboration: An empirical study of linus' law
    • A. Meneely and L. Williams. Secure open source collaboration: An empirical study of linus' law. In Proc. of CCS'09, 2009.
    • Proc. of CCS'09, 2009
    • Meneely, A.1    Williams, L.2
  • 15
    • 33845782503 scopus 로고    scopus 로고
    • Data mining static code attributes to learn defect predictors
    • T. Menzies, J. Greenwald, and A. Frank. Data mining static code attributes to learn defect predictors. TSE, 33(9):2-13, 2007.
    • (2007) TSE , vol.33 , Issue.9 , pp. 2-13
    • Menzies, T.1    Greenwald, J.2    Frank, A.3
  • 16
    • 33244463047 scopus 로고    scopus 로고
    • Use of relative code churn measures to predict system defect density
    • N. Nagappan and T. Ball. Use of relative code churn measures to predict system defect density. In Proc. of ICSE'05, pages 284-292, 2005.
    • (2005) Proc. of ICSE'05 , pp. 284-292
    • Nagappan, N.1    Ball, T.2
  • 18
    • 34248659137 scopus 로고    scopus 로고
    • Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes
    • H. M. Olague, S. Gholston, and S. Quattlebaum. Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes. TSE, 33(6):402-419, 2007.
    • (2007) TSE , vol.33 , Issue.6 , pp. 402-419
    • Olague, H.M.1    Gholston, S.2    Quattlebaum, S.3
  • 20
    • 78649415681 scopus 로고    scopus 로고
    • Software security growth modeling: Examining vulnerabilities with reliability growth models
    • A. Ozment. Software security growth modeling: Examining vulnerabilities with reliability growth models. In Proc. of QoP'06, 2006.
    • Proc. of QoP'06, 2006
    • Ozment, A.1
  • 22
    • 14744276335 scopus 로고    scopus 로고
    • Is finding security holes a good idea?
    • E. Rescorla. Is finding security holes a good idea? IEEE Sec. and Privacy, 3(1):14-19, 2005.
    • (2005) IEEE Sec. and Privacy , vol.3 , Issue.1 , pp. 14-19
    • Rescorla, E.1
  • 23
    • 62949190483 scopus 로고    scopus 로고
    • An empirical model to predict security vulnerabilities using code complexity metrics
    • Y. Shin and L. Williams. An empirical model to predict security vulnerabilities using code complexity metrics. In Proc. of ESEM'08, 2008.
    • Proc. of ESEM'08, 2008
    • Shin, Y.1    Williams, L.2
  • 24
    • 70349263324 scopus 로고    scopus 로고
    • Is complexity really the enemy of software security?
    • Y. Shin and L. Williams. Is complexity really the enemy of software security? In Proc. of QoP'08, pages 47-50, 2008.
    • (2008) Proc. of QoP'08 , pp. 47-50
    • Shin, Y.1    Williams, L.2
  • 26
    • 34548253429 scopus 로고    scopus 로고
    • Comments on data mining static code attributes to learn defect predictors
    • H. Zhang and X. Zhang. Comments on data mining static code attributes to learn defect predictors. TSE, 33(9):635-637, 2007.
    • (2007) TSE , vol.33 , Issue.9 , pp. 635-637
    • Zhang, H.1    Zhang, X.2
  • 27
    • 50049132401 scopus 로고    scopus 로고
    • Predicting defective software components from code complexity measures
    • H. Zhang, X. Zhang, and M. Gu. Predicting defective software components from code complexity measures. In Procc. of PRDC'07, pages 93-96, 2007.
    • (2007) Procc. of PRDC'07 , pp. 93-96
    • Zhang, H.1    Zhang, X.2    Gu, M.3
  • 29


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.