User-based multi-upgradation vulnerability discovery model

Swati Narang, P. K. Kapur, D. Damodaran, A. K. Shrivastava
{"title":"User-based multi-upgradation vulnerability discovery model","authors":"Swati Narang, P. K. Kapur, D. Damodaran, A. K. Shrivastava","doi":"10.1109/ICRITO.2017.8342459","DOIUrl":null,"url":null,"abstract":"A software practice like code reusability in the successive upgradations of the particular software is increasing vigorously. The software is upgraded when the new requirements of the customers explored in the market, thus it includes some of its own newly defined functionalities and some existing functionalities. However, the upgradation/version also includes the vulnerabilities which are generated either due to the effect of new features or the shared ones that were not resolved while testing. In operational phase, the vulnerabilities are discovered through the users who may adopt multiple versions of the software or have used only the single version. We have observed that the developers face many problems while predicting the multi upgradation vulnerabilities as some proportion of the vulnerabilities and the users of the successive versions are found to be similar. In this research work, we proposed a mathematical model that highlights the prediction of user-dependent vulnerabilities in a Multi-Upgradation software system. The model emphasizes on the impact of the shared code on the vulnerability's frequency rate and user's growth rate. A numerical is illustrated to validate the model capabilities with the help of real life data set.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO.2017.8342459","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

A software practice like code reusability in the successive upgradations of the particular software is increasing vigorously. The software is upgraded when the new requirements of the customers explored in the market, thus it includes some of its own newly defined functionalities and some existing functionalities. However, the upgradation/version also includes the vulnerabilities which are generated either due to the effect of new features or the shared ones that were not resolved while testing. In operational phase, the vulnerabilities are discovered through the users who may adopt multiple versions of the software or have used only the single version. We have observed that the developers face many problems while predicting the multi upgradation vulnerabilities as some proportion of the vulnerabilities and the users of the successive versions are found to be similar. In this research work, we proposed a mathematical model that highlights the prediction of user-dependent vulnerabilities in a Multi-Upgradation software system. The model emphasizes on the impact of the shared code on the vulnerability's frequency rate and user's growth rate. A numerical is illustrated to validate the model capabilities with the help of real life data set.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于用户的多次升级漏洞发现模型
在特定软件的连续升级中,诸如代码可重用性之类的软件实践正在蓬勃发展。该软件是在市场上发现客户的新需求时进行升级的,因此它包含了一些自己新定义的功能和一些现有的功能。然而,升级/版本还包括由于新功能的影响或在测试时未解决的共享漏洞而产生的漏洞。在操作阶段,漏洞是通过用户发现的,这些用户可能采用了多个软件版本,也可能只使用了一个版本。我们观察到,在预测多版本升级漏洞时,开发人员面临着许多问题,因为发现一些比例的漏洞和后续版本的用户相似。在这项研究工作中,我们提出了一个数学模型,突出了多升级软件系统中用户依赖漏洞的预测。该模型强调了共享代码对漏洞发生频率和用户增长率的影响。通过实例验证了该模型的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Fractal antenna for wireless applications Analysis of various techniques of feature extraction on skin lesion images Modeling and simulation of CEERI's water distribution network to detect leakage using HLR approach Design and analysis of symmetrical notch S shape patch antenna for wideband applications Experiences in the business process modelling at public organizations of La Pampa
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1