메뉴 건너뛰기




Volumn , Issue , 2010, Pages 251-260

Familiarity breeds contempt: The honeymoon effect and the role of legacy code in zero-day vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER SOFTWARE SELECTION AND EVALUATION; DEFECTS; LIFE CYCLE; ZERO-DAY ATTACK;

EID: 78751477710     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1920261.1920299     Document Type: Conference Paper
Times cited : (50)

References (35)
  • 2
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • William A. Arbaugh, William L. Fithen, and John McHugh. Windows of vulnerability: A case study analysis. Computer, 33(12):52-59, 2000.
    • (2000) Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 4
    • 85170021807 scopus 로고    scopus 로고
    • Koders.com. April
    • BlackDuck. Koders.com. http://corp.koders.com/about/, April 2010.
    • (2010) BlackDuck
  • 11
    • 78751563437 scopus 로고    scopus 로고
    • Eth zurich, dissertation 18197, ETH Zurich, ISBN 1-4392-5409-5, ISBN-13: 9781439254097
    • Stefan Frei. Security Econometrics - The Dynamics of (In)Security. Eth zurich, dissertation 18197, ETH Zurich, 2009. ISBN 1-4392-5409-5, ISBN-13: 9781439254097.
    • (2009) Security Econometrics - The Dynamics of (In)Security
    • Frei, S.1
  • 12
    • 0018505572 scopus 로고
    • A time dependent error detection model for software reliability and other performance measures
    • August
    • A.L. Goel and K. Okumoto. A time dependent error detection model for software reliability and other performance measures. IEEE Transactions on Reliability, R-28:206-211, August 1979.
    • (1979) IEEE Transactions on Reliability , vol.R-28 , pp. 206-211
    • Goel, A.L.1    Okumoto, K.2
  • 14
    • 85170002191 scopus 로고    scopus 로고
    • IBM Internet Security Systems - X-Force. X-Force Advisory. http://www.iss.net.
    • X-Force Advisory
  • 16
    • 50649084510 scopus 로고    scopus 로고
    • Post-release reliability growth in software products
    • Pankaj Jalote, Brendan Murphy, and Vibhu Saujanya Sharma. Post-release reliability growth in software products. ACM Trans. Softw. Eng. Methodol., 17(4):1-20, 2008.
    • (2008) ACM Trans. Softw. Eng. Methodol. , vol.17 , Issue.4 , pp. 1-20
    • Jalote, P.1    Murphy, B.2    Sharma, V.S.3
  • 17
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Erland Jonsson and Tomas Olovsson. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Softw. Eng., 23(4):235-245, 1997.
    • (1997) IEEE Trans. Softw. Eng. , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 19
    • 85169999453 scopus 로고    scopus 로고
    • Microsoft. Internet explorer architecture. http://msdn.microsoft.com/en- us/library/aa741312(VS.85).aspx, 2010.
    • (2010) Internet Explorer Architecture
  • 20
    • 85170024238 scopus 로고    scopus 로고
    • September
    • Microsoft Corporation. Microsoft security development lifecycle. http://www.microsoft.com/security/sdl/benefits/measurable.aspx, September 2008.
    • (2008) Microsoft Security Development Lifecycle
  • 21
    • 0016557617 scopus 로고
    • A theory of software reliability and its application
    • September
    • John D. Musa. A theory of software reliability and its application. IEEE Transactions on Security Engineering, SE-1:312-327, September 1975.
    • (1975) IEEE Transactions on Security Engineering , vol.SE-1 , pp. 312-327
    • Musa, J.D.1
  • 26
    • 0020904598 scopus 로고
    • Theory of program testing - An overview
    • December
    • R.E. Prather. Theory of program testing - an overview. Bell System Technical Journal, 72(10):3073-3105, December 1983.
    • (1983) Bell System Technical Journal , vol.72 , Issue.10 , pp. 3073-3105
    • Prather, R.E.1
  • 31
    • 78751508536 scopus 로고    scopus 로고
    • SecurityTracker
    • SecurityTracker. http://www.SecurityTracker.com. SecurityTracker.
    • SecurityTracker
  • 32
    • 85170004857 scopus 로고    scopus 로고
    • TippingPoint
    • TippingPoint. Zero day initiative (zdi). http://www.zerodayinitiative. com/.
    • Zero Day Initiative (Zdi)
  • 33
    • 85170001761 scopus 로고    scopus 로고
    • US-CERT. Vulnerability statistics. http://www.cert.org/stats/ vulnerability\-remediation.html.
    • Vulnerability Statistics
  • 34


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.