Back to Search Start Over

An Empirical Investigation on Vulnerability for Software Companies

Authors :
Jianping Peng
Guoying Zhang
Chun-Hung Chiu
Source :
International Journal of Systems and Software Security and Protection. 13:1-15
Publication Year :
2022
Publisher :
IGI Global, 2022.

Abstract

This research analyzes software vulnerability information from the perspective of software companies. A total of 13019 vulnerabilities from 136 software companies were collected from a public vulnerability database. A latent class model classifies the companies into three classes based on vulnerability information during a five-year period, and then three class-specific models pinpoint the most significant key features of vulnerabilities for each class. A class I company can reduce vulnerability level if it puts focus on "boundary condition errors," "input validation errors," and "exception handling errors." A class II company needs to emphasize "access validation errors" and "race condition errors." Interestingly, a class III company needs to avoid any potential "origin validation errors," "boundary condition errors," "design errors," and "access validation errors." With these significant key features information, software companies can effectively reduce vulnerability by managing related errors throughout the development and testing process.

Subjects

Subjects :
General Medicine

Details

ISSN :
26404273 and 26404265
Volume :
13
Database :
OpenAIRE
Journal :
International Journal of Systems and Software Security and Protection
Accession number :
edsair.doi...........eda100941744c1e2ac271d0e905fa8ba