Open source software security vulnerability detection based on dynamic behavior features

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Open-source Security Software Security for Open-source Systems

S ome people have claimed that open-source software is intrinsically more secure than closed source, 1 and others have claimed that it's not. 2 Neither case is absolutely true: they are essentially flip sides of the same coin. Open source gives both attackers and defenders greater analytic power to do something about software vulnerabilities. If the defender does nothing about security, though,...

متن کامل

Software Security through Open Source *

The last few years have shown a worldwide rise in the attention for, and actual use of, open source software (OSS), most notably of the operating system Linux and various applications running on top of it. Variousmajor companies and governments are adopting OSS. As a result, there are many publications concerning its advantages and disadvantages. The ongoing discussions cover a wide range of to...

متن کامل

Software Vulnerabilities: Open Source versus Proprietary Software Security

This study seeks to empirically investigate specific security characteristics of both open source software and proprietary software. Operating system software vulnerability data spanning several years are collected and analyzed to determine if significant differences exist in terms of inter-arrival times of published vulnerabilities and patch releases. Open source software is only marginally qu...

متن کامل

Hyper Contextual Software Security Management for Open Source Software

Since the turn of the century, open source software (OSS) has been an active and dynamic research area. OSS development and maintenance are highly distributed processes that involve a multitude of supporting tools and resources. OSS communities use numerous knowledge sources while working on a certain task to help them secure the software products. These not only include security incidents stat...

متن کامل

Vulnerability discovery & software security

This dissertation is the result of my own work and includes nothing which is the outcome of work done in collaboration except where specifically indicated in the text. This dissertation does not exceed the regulation length of 60,000 words, including tables and footnotes, but excluding the bibliography and appendix. Acknowledgements My work has been supported at various times by a Marshall Scho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: PLOS ONE

سال: 2019

ISSN: 1932-6203

DOI: 10.1371/journal.pone.0221530