메뉴 건너뛰기




Volumn 37, Issue 3, 2011, Pages 371-386

An attack surface metric

Author keywords

Code design; Life cycle; Product metrics; Protection mechanisms; Risk mitigation; Software security

Indexed keywords

CODE DESIGNS; PRODUCT METRICS; PROTECTION MECHANISMS; RISK MITIGATION; SOFTWARE SECURITY;

EID: 79957876122     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2010.60     Document Type: Article
Times cited : (448)

References (53)
  • 3
    • 2342581753 scopus 로고    scopus 로고
    • From the ground up: The dimacs software security workshop
    • Mar./Apr.
    • G. McGraw, "From the Ground Up: The DIMACS Software Security Workshop," IEEE Security and Privacy, vol. 1, no. 2, pp. 59-66, Mar./Apr. 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.2 , pp. 59-66
    • McGraw, G.1
  • 9
    • 0001383866 scopus 로고
    • An introduction to input/output automata
    • Sept.
    • N. Lynch and M. Tuttle, "An Introduction to Input/Output Automata," CWI-Quarterly, vol. 2, no. 3, pp. 219-246, Sept. 1989.
    • (1989) CWI-Quarterly , vol.2 , Issue.3 , pp. 219-246
    • Lynch, N.1    Tuttle, M.2
  • 10
    • 34547444679 scopus 로고    scopus 로고
    • PhD dissertation, Carnegie Mellon Univ., Dec.
    • P.K. Manadhata, "An Attack Surface Metric," PhD dissertation, Carnegie Mellon Univ., Dec. 2008.
    • (2008) An Attack Surface Metric
    • Manadhata, P.K.1
  • 12
    • 0033346610 scopus 로고    scopus 로고
    • Critique of software defect prediction models
    • DOI 10.1109/32.815326
    • N.E. Fenton and M. Neil, "A Critique of Software Defect Prediction Models," IEEE Trans. Software Eng., vol. 25, no. 5, pp. 675-689, Sept./Oct. 1999. (Pubitemid 30541838)
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 675-689
    • Fenton, N.E.1    Neil, M.2
  • 17
    • 84937653154 scopus 로고
    • Towards a framework for software measurement validation
    • Dec.
    • B. Kitchenham, S.L. Pfleeger, and N. Fenton, "Towards a Framework for Software Measurement Validation," IEEE Trans. Software Eng., vol. 21, no. 12, pp. 929-944, Dec. 1995.
    • (1995) IEEE Trans. Software Eng. , vol.21 , Issue.12 , pp. 929-944
    • Kitchenham, B.1    Pfleeger, S.L.2    Fenton, N.3
  • 18
    • 0026869449 scopus 로고
    • Methodology for validating software metrics
    • May
    • N. Schneidewind, "Methodology for Validating Software Metrics," IEEE Trans. Software Eng., vol. 18, no. 5, pp. 410-422, May 1992.
    • (1992) IEEE Trans. Software Eng. , vol.18 , Issue.5 , pp. 410-422
    • Schneidewind, N.1
  • 19
    • 0024071092 scopus 로고
    • Evaluating software complexity measures
    • Sept.
    • E. Weyuker, "Evaluating Software Complexity Measures," IEEE Trans. Software Eng., vol. 14, no. 9, pp. 1357-1365, Sept. 1988.
    • (1988) IEEE Trans. Software Eng. , vol.14 , Issue.9 , pp. 1357-1365
    • Weyuker, E.1
  • 23
    • 79957863416 scopus 로고    scopus 로고
    • Properties for security measures of software products
    • May
    • M.Y. Liu and I. Traore, "Properties for Security Measures of Software Products," Applied Math. and Information Science J., vol. 1, no. 2, pp. 129-156, May 2007.
    • (2007) Applied Math. and Information Science J. , vol.1 , Issue.2 , pp. 129-156
    • Liu, M.Y.1    Traore, I.2
  • 24
    • 79957826919 scopus 로고    scopus 로고
    • Microsoft Corporation
    • Microsoft Corporation, "Microsoft Security Bulletin Search," http://www.microsoft.com/technet/security/current.aspx, 2010.
    • (2010) Microsoft Security Bulletin Search
  • 28
    • 0023349750 scopus 로고
    • An empirical validation of software cost estimation models
    • C.F. Kemerer, "An Empirical Validation of Software Cost Estimation Models," Comm. ACM, vol. 30, no. 5, pp. 416-429, 1987.
    • (1987) Comm. ACM , vol.30 , Issue.5 , pp. 416-429
    • Kemerer, C.F.1
  • 29
    • 0034206537 scopus 로고    scopus 로고
    • Validation of an approach for improving existing measurement frameworks
    • June
    • M.G. Mendonça and V.R. Basili, "Validation of an Approach for Improving Existing Measurement Frameworks," IEEE Trans. Software Eng., vol. 26, no. 6, pp. 484-499, June 2000.
    • (2000) IEEE Trans. Software Eng. , vol.26 , Issue.6 , pp. 484-499
    • Mendonça, M.G.1    Basili, V.R.2
  • 30
    • 0001859044 scopus 로고
    • A Technique for the Measurement of Attitudes
    • June
    • R. Likert, "A Technique for the Measurement of Attitudes," Archives of Psychology, vol. 22, no. 140, pp. 5-55, June 1932.
    • (1932) Archives of Psychology , vol.22 , Issue.140 , pp. 5-55
    • Likert, R.1
  • 33
    • 79957808007 scopus 로고    scopus 로고
    • S.M. Christey personal communication, 2007.
    • S.M. Christey personal communication, 2007.
  • 34
    • 79957855511 scopus 로고    scopus 로고
    • M. Howard personal communication, 2005.
    • M. Howard personal communication, 2005.
  • 35
    • 79957795181 scopus 로고    scopus 로고
    • Feb.
    • Microsoft Security Research and Defense, http://blogs.technet. com/srd/archive/2008/02/06/the-kill-2d00-bit-faq -3a00- part-1-of-3.aspx, Feb. 2008.
    • (2008) Microsoft Security Research and Defense
  • 36
    • 79957838109 scopus 로고    scopus 로고
    • G. Markham, "Reducing Attack Surface," http://weblogs. mozillazine.org/gerv/archives/2007/02/reducing-attack- surface.html, 2009.
    • (2009) Reducing Attack Surface
    • Markham, G.1
  • 41
    • 0017292244 scopus 로고
    • Design and code inspections to reduce errors in program development
    • M. Fagan, "Design and Code Inspections to Reduce Errors in Program Development," IBM Systems J., vol. 15, no. 3, pp. 182-211, 1976.
    • (1976) IBM Systems J. , vol.15 , Issue.3 , pp. 182-211
    • Fagan, M.1
  • 44
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • DOI 10.1109/32.815323
    • R. Ortalo, Y. Deswarte, and M. Kaâniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Trans. Software Eng., vol. 25, no. 5, pp. 633-650, Sept./ Oct. 1999. (Pubitemid 30541841)
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 45
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • B. Schneier, "Attack Trees: Modeling Security Threats," Dr. Dobb's J., vol. 24, no. 12, pp. 21-29, 1999.
    • (1999) Dr. Dobb's J. , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 47
    • 38949137343 scopus 로고    scopus 로고
    • Estimating a system's mean time-to-compromise
    • DOI 10.1109/MSP.2008.9
    • D.J. Leversage and E.J. Byres, "Estimating a System's Mean Timeto- Compromise," IEEE Security and Privacy, vol. 6, no. 1, pp. 52-60, Jan./Feb. 2008. (Pubitemid 351229833)
    • (2008) IEEE Security and Privacy , vol.6 , Issue.1 , pp. 52-60
    • Leversage, D.J.1    Byres, E.J.2
  • 48
    • 27644561245 scopus 로고    scopus 로고
    • Modeling and simulation in security evaluation
    • DOI 10.1109/MSP.2005.129
    • D.M. Nicol, "Modeling and Simulation in Security Evaluation," IEEE Security and Privacy, vol. 3, no. 5, pp. 71-74, Sept./Oct. 2005. (Pubitemid 41560449)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5 , pp. 71-74
    • Nicol, D.M.1
  • 53
    • 79957828361 scopus 로고    scopus 로고
    • MuSecurity "What Is a Security Analyzer," http://www. musecurity.com/solutions/overview/security.html, 2009.
    • (2009) What Is A Security Analyzer


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.