谷歌浏览器插件
订阅小程序
在清言上使用

Towards a Taxonomy of Vulnerabilities

Waikoloa, HI(2007)

引用 16|浏览0
暂无评分
摘要
This paper presents a taxonomy of vulnerabilities created as a part of an effort to develop a framework for deriving verification and validation strategies to assess software security. This taxonomy is grounded in a Process/Object Model of Computation that establishes a relationship between software vulnerabilities, an executing process, and computer system resources such as memory, input/output, or cryptographic resources. That relationship promotes the concept that a software application is vulnerable to exploits when it permits the violation of (a) constraints imposed by computer system resources and/or (b) assumptions made about the usage of those resources. The taxonomy identifies and classifies these constraints and assumptions. The Process/Object Model also serves as a basis for the classification scheme the taxonomy uses. That is, the computer system resources (or objects) identified in the Process/Object Model form the categories and refined subcategories of the taxonomy. Vulnerabilities, which are expressed in the form of constraints and assumptions, are classified within the taxonomy according to these categories and subcategories. This taxonomy of vulnerabilities is novel and distinctively different from other taxonomies found in literature.
更多
查看译文
关键词
refined subcategories,software security,taxonomy use,software application,classification scheme,cryptographic resource,software vulnerability,object model form,object model,computer system resource,resource allocation,verification and validation,input output
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要