Computer Vulnerability Analysis: Thesis Proposal

نویسنده

  • Ivan Krsul
چکیده

Computer security professionals and researchers do not have a history of sharing and analyzing computer vulnerability information. Scientists and engineers from older or more established fields have long understood that publicizing, analyzing, and learning from other people's mistakes is essential to the stepwise refinement of complex systems. Computer scientists, however, have not followed suit. Programmers reinvent classical programming mistakcs, contributing to the reappearance of known vulnerabilities. In the recent past, complltcr systems have come to be a part of critical systems that have a direct effect on the safety and well-being of human beings and hence we must have lower tolerance for software failures. In the dissedation I will attempt to show that computer vulnerability information presents important regularities and these can be detected, and possibly visualized, providing important insight about the reason of their prevalence and existence. The information derived from these observations could be used to improve on all phases of the development of software systems, as could be in the design, development, debugging, testing and maintenance of complex computer systems that must implement a set of policies defined by security analysis. A significant portion of the work that must be performed will concentrate on the development of clilSSifications and taxonomies that will permit the visualization and analysis of computer vulnerability information. I hope that these classifications and taxonomies applied to a collection of vulnerabilities will provide a set of features whose analysis will show that there arc clear statistical clustering:; and patterns caused because developers and programmers are not learning from each others mistakes. Tlti.s analysis may be performed by applying statistical analysis and knowledge discovery tools.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Binary-Centric Approach to Vulnerability Analysis and Defense

This thesis takes a binary-centric approach for defending against vulnerabilities. A binary-centric approach is attractive for two reasons. First, most users only have access to programs in binary form (e.g., executables), thus security defenses based upon binary analysis are likely widely applicable. Second, a binary itself is often the most faithful encoding of security-relevant details since...

متن کامل

Licentiate Thesis Proposal Clustering and Case-Based Reasoning for User Stereotypes

This document presents a proposal for the contents of a licentiate thesis in computer science at Mälardalen University, Sweden. The main subject of the thesis is the usage and creation of user stereotypes, aided by the use of clustering techniques to find similar groups of users. To reason about and maintain the user stereotypes, we primarily use Case-Based Reasoning (CBR). The techniques prese...

متن کامل

NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS A DEMONSTRATION OF THE SUBVERSION THREAT: FACING A CRITICAL RESPONSIBILITY IN THE DEFENSE OF CYBERSPACE

This thesis demonstrates that it is reasonably easy to subvert an information system by inserting software artifices that would enable a knowledgeable attacker to obtain total and virtually undetectable control of the system. Recent security incidents are used to show that means, motive, and opportunity exist for an attack of this nature. Subversion is the most attractive option to the professi...

متن کامل

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Proposal for Thesis Research in Partial Fulfillment Of the Requirements for

Laboratory where thesis will be done CSAIL Brief Statement of the Problem: Usability and security are widely seen as two antagonistic design goals for complex computer systems. This thesis argues that conventional wisdom is wrong: for the majority of users and applications, increased security cannot be achieved with technology that decreases usability. This thesis aims to develop a set of desig...

متن کامل

Designing a thesis tele-supervision system for postgraduate medical sciences students

Introduction: Today, progressing science and technology atall domains, including education and research, will bring newopportunities to resolve the communication and interactionproblems. The aim of this study was to determine potential factorsaffecting the thesis supervision and provide a web-based solution.Methods: This is a developmental study conducted in two<br...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997