Manual vs. Automated Vulnerability Assessment: A Case Study

نویسندگان

  • James A. Kupsch
  • Barton P. Miller
چکیده

The dream of every software development team is to assess the security of their software using only a tool. In this paper, we attempt to evaluate and quantify the effectiveness of automated source code analysis tools by comparing such tools to the results of an in-depth manual evaluation of the same system. We present our manual vulnerability assessment methodology, and the results of applying this to a major piece of software. We then analyze the same software using two commercial products, Coverity Prevent and Fortify SCA, that perform static source code analysis. These tools found only a few of the fifteen serious vulnerabilities discovered in the manual assessment, with none of the problems found by these tools requiring a deep understanding of the code. Each tool reported thousands of defects that required human inspection, with only a small number being security related. And, of this small number of security-related defects, there did not appear to be any that indicated significant vulnerabilities beyond those found by the manual assessment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مقایسه شمارش خودکار با شمارش دستی نوتروفیل‌ها در تشخیص پریتونیت باکتریال خود به خودی

Introduction: Spontaneous bacterial peritonitis (SBP) is a prevalent complication in the patients with cirrhosis and ascites, which leads to high intrahospital mortality. Diagnosis is made when ascetic fluid neutrophils is ≥250 cells/mm3. Manual counting of neutrophils is time-consuming, technically difficult, expensive and in many cases individual-dependent. In contrast, automated counting ...

متن کامل

Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

The fast adaptation of Cloud computing has led to an increased speedy rate of novel information technology threats. The targets of these new threats involve from large scale distributed system, such as the Large Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed systems, i.e. SCADA systems. The use of automated tools for vulnerability assessmen...

متن کامل

Automated Vulnerability Management of Computer Systems

With the continuous flood of vulnerabilities of computer systems, vulnerability management is a very important task for administrators to keep systems as secure as possible. However current manual vulnerability management by administrators is very time-consuming and error-prone. This paper proposes an open framework of automated vulnerability management that dramatically alleviates the burden o...

متن کامل

Application Vulnerability: Trend Analysis and Correlation of Coding Patterns Across Industries

Attacks on Web applications threaten nearly every organization with an online presence. Based on our experience, these unwelcome assaults cost companies millions of dollars and can cause serious damage in terms of brand integrity and customer turnover. Our Enterprise Risk and Security Solutions (ERSS) assessment team recently evaluated the state of Web application vulnerability using automated ...

متن کامل

Assessment of Social Vulnerability to the adverse effects of air pollution: A case study: Sistan Plain

Background & Aim: The Sistan region with over 320 dry days is one of the focal points of the rainstorms, and every year the number of days with dust increases, which results in socio-economic consequences for more than 400,000 people in the region. This study investigated the social vulnerability of the population to air pollution with a different perspective. Methods: The present study is a d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009