Game of detections: how are security vulnerabilities discovered in the wild?
There is little or no information available on what actually happens when a software vulnerability is detected. We performed an empirical study on reporters of the three most prominent security vulnerabilities: buffer overflow, SQL injection, and cross site scripting vulnerabilities. The goal was to...
Gespeichert in:
| Veröffentlicht in: | Empirical software engineering : an international journal Jg. 21; H. 5; S. 1920 - 1959 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
Springer US
01.10.2016
Springer Nature B.V |
| Schlagworte: | |
| ISSN: | 1382-3256, 1573-7616 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | There is little or no information available on what actually happens when a software vulnerability is detected. We performed an empirical study on reporters of the three most prominent security vulnerabilities: buffer overflow, SQL injection, and cross site scripting vulnerabilities. The goal was to understand the methods and tools used during the discovery and whether the community of developers exploring one security vulnerability differs—in their approach—from another community of developers exploring a different vulnerability. The reporters were featured in the SecurityFocus repository for twelve month periods for each vulnerability. We collected 127 responses. We found that the communities differ based on the security vulnerability they target; but within a specific community, reporters follow similar approaches. We also found a serious problem in the vulnerability reporting process that is common for all communities. Most reporters, especially the experienced ones, favor full-disclosure and do not collaborate with the vendors of vulnerable software. They think that the public disclosure, sometimes supported by a detailed exploit, will put pressure on vendors to fix the vulnerabilities. But, in practice, the vulnerabilities not reported to vendors are less likely to be fixed. Ours is the first study on vulnerability repositories that targets the reporters of the most common security vulnerabilities, thus concentrating on the people involved in the process; previous works have overlooked this rich information source. The results are valuable for beginners exploring how to detect and report security vulnerabilities and for tool vendors and researchers exploring how to automate and fix the process. |
|---|---|
| AbstractList | There is little or no information available on what actually happens when a software vulnerability is detected. We performed an empirical study on reporters of the three most prominent security vulnerabilities: buffer overflow, SQL injection, and cross site scripting vulnerabilities. The goal was to understand the methods and tools used during the discovery and whether the community of developers exploring one security vulnerability differs—in their approach—from another community of developers exploring a different vulnerability. The reporters were featured in the SecurityFocus repository for twelve month periods for each vulnerability. We collected 127 responses. We found that the communities differ based on the security vulnerability they target; but within a specific community, reporters follow similar approaches. We also found a serious problem in the vulnerability reporting process that is common for all communities. Most reporters, especially the experienced ones, favor full-disclosure and do not collaborate with the vendors of vulnerable software. They think that the public disclosure, sometimes supported by a detailed exploit, will put pressure on vendors to fix the vulnerabilities. But, in practice, the vulnerabilities not reported to vendors are less likely to be fixed. Ours is the first study on vulnerability repositories that targets the reporters of the most common security vulnerabilities, thus concentrating on the people involved in the process; previous works have overlooked this rich information source. The results are valuable for beginners exploring how to detect and report security vulnerabilities and for tool vendors and researchers exploring how to automate and fix the process. |
| Author | Hafiz, Munawar Fang, Ming |
| Author_xml | – sequence: 1 givenname: Munawar surname: Hafiz fullname: Hafiz, Munawar email: munawar.hafiz@gmail.com organization: Department of Computer Science and Software Engineering, Auburn University – sequence: 2 givenname: Ming surname: Fang fullname: Fang, Ming organization: Department of Computer Science and Software Engineering, Auburn University |
| BookMark | eNp9kMtKxTAQhoMoeH0AdwE3bqqTe-tGRLzBATe6Dmk61UhPo0mq-Pb2cARB0NXM4v9mfr5dsjnGEQk5ZHDCAMxpZqC1rICpqpEgKrNBdpgy86KZ3px3UfNKcKW3yW7OLwDQGKl2yOLGLZHGnnZY0JcQx3xGn-MHdQlpRj-lUD7p-zSMmFwbhlACZtqF7OM7JuxoGGl5RvoRhu58n2z1bsh48D33yOP11cPlbbW4v7m7vFhUXsimVDVrjQZfK99yLrXXTjApG-QM2rZmEp3RLev7TnlmOie846DqDtAg1L1SYo8cr---pvg2YS52ORfCYXAjxilbVgulAepGztGjX9GXOKVxbmc5aGEaDrA6yNYpn2LOCXv7msLSpU_LwK782rVfO_u1K7_WzIz5xfhQ3MpgSS4M_5J8Teb5y_iE6afT39AX4b6P_g |
| CitedBy_id | crossref_primary_10_5325_jinfopoli_7_1_0372 crossref_primary_10_5325_jinfopoli_7_2017_0372 crossref_primary_10_1371_journal_pone_0304467 crossref_primary_10_1016_j_chb_2019_09_028 crossref_primary_10_1016_j_cosrev_2025_100728 crossref_primary_10_1016_j_cose_2022_102936 crossref_primary_10_1145_3716822 crossref_primary_10_1016_j_infsof_2025_107786 crossref_primary_10_1007_s10664_022_10179_6 |
| Cites_doi | 10.1145/1455770.1455774 10.1007/978-3-642-15512-3_23 10.1007/978-3-642-36563-8_14 10.1145/1646353.1646374 10.1109/ICSE.2009.5070530 10.1109/ESEM.2011.18 10.1145/1809100.1809104 10.1109/ISSRE.2009.25 10.1002/spe.2109 10.1145/1853919.1853925 10.1145/2504730.2504747 10.1145/2531602.2531722 10.1109/ESEM.2007.11 10.1109/ICSE.2013.6606613 10.1109/ICSE.2012.6227141 10.1109/ISSRE.2004.1 10.1016/S1353-4858(07)70094-6 10.1007/978-3-642-14215-4_7 10.1109/SECPRI.2001.924300 10.1109/IMF.2009.15 10.1145/2652524.2652533 10.1109/ISSRE.2013.6698898 10.1109/RAMS.2006.1677355 10.1109/2.889093 10.1145/2635868.2635880 10.1007/978-3-642-27576-0_24 10.1007/978-3-642-23088-2_15 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media New York 2015 Copyright Springer Science & Business Media 2016 |
| Copyright_xml | – notice: Springer Science+Business Media New York 2015 – notice: Copyright Springer Science & Business Media 2016 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1007/s10664-015-9403-7 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-7616 |
| EndPage | 1959 |
| ExternalDocumentID | 10_1007_s10664_015_9403_7 |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 199 1N0 1SB 2.D 203 28- 29G 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 78A 8FE 8FG 8TC 8UJ 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW L6V LAK LLZTM M4Y M7S MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P62 P9O PF0 PT4 PT5 PTHSS Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S0W S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7V Z7X Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8P Z8R Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c349t-81b760c85cb2246c6a31449e210bb814ea76b1ffd5c17da3ca2058d0e7e08f553 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 25 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000382017100002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1382-3256 |
| IngestDate | Sun Nov 09 11:26:23 EST 2025 Tue Dec 02 15:54:44 EST 2025 Sat Nov 29 05:37:42 EST 2025 Tue Nov 18 20:15:37 EST 2025 Fri Feb 21 02:35:47 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Keywords | Secure software engineering Empirical study Vulnerability |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c349t-81b760c85cb2246c6a31449e210bb814ea76b1ffd5c17da3ca2058d0e7e08f553 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| PQID | 2063792005 |
| PQPubID | 326341 |
| PageCount | 40 |
| ParticipantIDs | proquest_miscellaneous_1835600894 proquest_journals_2063792005 crossref_primary_10_1007_s10664_015_9403_7 crossref_citationtrail_10_1007_s10664_015_9403_7 springer_journals_10_1007_s10664_015_9403_7 |
| PublicationCentury | 2000 |
| PublicationDate | 20161000 2016-10-00 20161001 |
| PublicationDateYYYYMMDD | 2016-10-01 |
| PublicationDate_xml | – month: 10 year: 2016 text: 20161000 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Empirical software engineering : an international journal |
| PublicationTitleAbbrev | Empir Software Eng |
| PublicationYear | 2016 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Cova M, Leita C, Thonnard O, Keromytis A, Dacier M (2010) An analysis of rogue AV campaigns. In: Proceedings of the 13th international conference on Recent advances in intrusion detection, RAID’10. Springer-Verlag, Berlin, Heidelberg, pp 442–463 Franklin J, Perrig A, Paxson V, Savage S (2007) An inquiry into the nature and causes of the wealth of internet miscreants. In: Ning P, di Vimercati SDC, Syverson PF (eds) Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, pp 375–388. ACM Austin A, Williams L (2011) One technique is not enough: A comparison of vulnerability discovery techniques. In: ESEM ’11 Johnson B, Song Y, Murphy-Hill E, Bowdidge R (2013) Why don’t software developers use static analysis tools to find bugs?. In: ICSE ’13. ACM Rutar N, Almazan C, Foster J (2004) A comparison of bug finding tools for Java. In: ISSRE ’04. IEEE Computer Society Weinstein M (2012) TAMS Analyzer for Macintosh OS X: The native open source, Macintosh qualitative research tool Suto L (2007) Analyzing the effectiveness and coverage of Web application security scanners. Tech. rep., eEye Digital Security Schryen G (2009) A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In: IMF Patton M (2001) Qualitative Research & Evaluation Methods, 3 edn. Sage Publications Ltd., Singapore Arora A, Krishnan R, Telang R, Yang Y (2004) Impact of vulnerability disclosure and patch availability - An empirical analysis. In: WEIS ’04 McGraw G, Steven J (2011) Software [In]security: Comparing apples, oranges, and aardvarks (or, all static analysis tools are not created equal). http://www.informit.com/articles/article.aspx?p=1680863 OkhraviHNicolDEvaluation of patch management strategiesInt J Comput Intell Theory Pract20083109117 Wu Y, Gandhi R, Siy H (2010) Using semantic templates to study vulnerabilities recorded in large software repositories. In: SESS ’10. ACM Shahzad M, Shafiq M, Liu A (2012) A large scale exploratory analysis of software vulnerability life cycles. In: ICSE ’12. IEEE Press Krippendorff K (2004) Content Analysis: An Introduction to Its Methodology. Sage Publications Ltd., Singapore Wilander J, Kamkar M (2003) A comparison of publicly available tools for dynamic buffer overflow prevention. In: NDSS ’03. The Internet Society Frei S, Schatzmann D, Plattner B, Trammell B (2009) Modelling the security ecosystem- The dynamics of (in)security. In: WEIS ’09 Scandariato R, Walden J, Joosen W (2013) Static analysis versus penetration testing: A controlled experiment. In: 2013 IEEE 24th international symposium on software reliability engineering (ISSRE), pp 451–460 TippingPoint Zero Day Initiative (ZDI). http://www.zerodayinitiative.com Layman L, Williams L, Amant R (2007) Toward reducing fault fix time: Understanding developer behavior for the design of automated fault detection tools. In: ESEM ’07. IEEE Computer Society Xiao S, Witschey J, Murphy-Hill E (2014) Social influences on secure development tool adoption: Why security tools spread. In: CSCW ’14. ACM, New York, NY, USA, pp 1095–1106 Fang M, Hafiz M (2014) Discovering buffer overflow vulnerabilities in the wild: an empirical study. In: Morisio M, Dybå T, Torchiano M (eds) 2014 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM ’14, Torino, Italy, September 18–19, 2014, p 23. ACM Massacci F, Nguyen V (2010) Which is the right source for vulnerability studies?: An empirical analysis on mozilla firefox. In: MetriSec ’10. ACM Denzin N (1978) The Research Act: A Theoretical Introduction to Sociological Methods. McGraw-Hill, New York Doupé A, Cova M, Vigna G (2010) Why Johnny can’t Pentest: An analysis of black-box web vulnerability scanners. In: DIMVA ’10. Springer BesseyABlockKChelfBChouAFultonBHallemSHenri-GrosCKamskyAMcPeakSEnglerDA few billion lines of code later: Using static analysis to find bugs in the real worldCommun ACM2010532667510.1145/1646353.1646374 Saldana J (2009) The Coding Manual for Qualitative Researchers. Sage Publications Ltd, Singapore ArbaughWFithenWMcHughJWindows of vulnerability: A case study analysisComputer20003312525910.1109/2.889093 Zhang S, Caragea D, Ou X (2011) An empirical study on using the national vulnerability database to predict software vulnerabilities. In: DEXA ’11. Springer Anbalagan P, Vouk M (2009) Towards a unifying approach in understanding security problems. In: ISSRE’09. IEEE Press Cheswick B (1992) An evening with berferd in which a cracker is lured, endured, and studied. In: Proc. Winter USENIX Conference, pp 163–174 Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: Characterizing payments among men with no names. In: Proceedings of the 2013 conference on internet measurement conference, IMC ’13. ACM, New York, NY, USA, pp 127–140 SecurityFocus Bugtraq vulnerability list. http://www.securityfocus.com Bosu A, Carver JC, Hafiz M, Hilley P, Janni D (2014) Identifying the characteristics of vulnerable code changes: An empirical study. In: 22nd ACM SIGSOFT international symposium on the foundations of software engineering, p To appear Verisign iDefense security intelligence services. http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/index.xhtml Browne H, Arbaugh W, McHugh J, Fithen W (2001) A trend analysis of exploitations. In: IEEE S&P ’01. IEEE Computer Society Yin R (2011) Case Study Research: Design and Methods. Sage Publications Ltd, Singapore Frei S, Tellenbach B, Plattner B (2008) 0-day patch - Exposing vendors’ (In)security performance. BlackHat Europe Open Web Application Security Project (OWASP) (2014) Owasp top ten 2013 project. https://www.owasp.org/index.php/Top_10_2013-Table_of_Contents McQueen M, McQueen T, Boyer W, Chaffin M (2009) Empirical estimates and observations of 0-day vulnerabilities. In: HICSS ’09, pp 1 –12 Edmundson A, Holtkamp B, Rivera E, Finifter M, Mettler A, Wagner D (2013) An empirical study on the effectiveness of security code review. In: ESSoS ’13, Lecture Notes in Computer Science, vol 7781, pp 197–212. Springer Berlin Heidelberg Mell P, Scarfone K, Romanosky S (2007) CVSS: A complete guide to the Common Vulnerability Scoring System Version 2.0. Tech. rep., FIRST.org Scholte T, Balzarotti D, Kirda E (2012) Quo vadis? A study of the evolution of input validation vulnerabilities in web applications. In: FC’11. Springer-Verlag Gopalakrishna R, Spafford E (2005) A trend analysis of vulnerabilities. Tech. rep., CERIAS Aranda J, Venolia G (2009) The secret life of bugs: Going past the errors and omissions in software repositories. In: ICSE ’09. IEEE Computer Society Kanich C, Kreibich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S (2008) Spamalytics: An empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM conference on computer and communications security, CCS ’08. ACM, New York, NY, USA, pp 3–14 Finifter M, Akhawe D, Wagner D (2013) An empirical study of vulnerability rewards programs. In: USENIX Security’ 13. USENIX Association Schneier B (2000) Full disclosure and the window of exposure. Crypto-Gram Newsletter Alhazmi O, Malaiya Y (2006) Prediction capabilities of vulnerability discovery models. In: RAMS’06. IEEE Computer Society BacaDCarlssonBPetersenKLundbergLImproving software security with static automated code analysis in an industry settingSoftware—Practice and Experience201343325927910.1002/spe.2109 9403_CR9 9403_CR2 A Bessey (9403_CR8) 2010; 53 9403_CR3 9403_CR10 9403_CR1 9403_CR6 9403_CR50 9403_CR5 9403_CR17 9403_CR18 9403_CR15 9403_CR16 9403_CR13 9403_CR14 9403_CR11 9403_CR12 9403_CR19 9403_CR20 9403_CR21 9403_CR28 9403_CR29 9403_CR26 9403_CR27 9403_CR24 9403_CR25 9403_CR22 9403_CR23 9403_CR32 D Baca (9403_CR7) 2013; 43 9403_CR30 W Arbaugh (9403_CR4) 2000; 33 9403_CR39 9403_CR37 9403_CR38 9403_CR35 9403_CR36 9403_CR33 9403_CR34 9403_CR42 9403_CR43 9403_CR40 9403_CR41 H Okhravi (9403_CR31) 2008; 3 9403_CR48 9403_CR49 9403_CR46 9403_CR47 9403_CR44 9403_CR45 |
| References_xml | – reference: McGraw G, Steven J (2011) Software [In]security: Comparing apples, oranges, and aardvarks (or, all static analysis tools are not created equal). http://www.informit.com/articles/article.aspx?p=1680863 – reference: Scholte T, Balzarotti D, Kirda E (2012) Quo vadis? A study of the evolution of input validation vulnerabilities in web applications. In: FC’11. Springer-Verlag – reference: Franklin J, Perrig A, Paxson V, Savage S (2007) An inquiry into the nature and causes of the wealth of internet miscreants. In: Ning P, di Vimercati SDC, Syverson PF (eds) Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, pp 375–388. ACM – reference: Shahzad M, Shafiq M, Liu A (2012) A large scale exploratory analysis of software vulnerability life cycles. In: ICSE ’12. IEEE Press – reference: Alhazmi O, Malaiya Y (2006) Prediction capabilities of vulnerability discovery models. In: RAMS’06. IEEE Computer Society – reference: Schryen G (2009) A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In: IMF – reference: Frei S, Schatzmann D, Plattner B, Trammell B (2009) Modelling the security ecosystem- The dynamics of (in)security. In: WEIS ’09 – reference: Zhang S, Caragea D, Ou X (2011) An empirical study on using the national vulnerability database to predict software vulnerabilities. In: DEXA ’11. Springer – reference: Edmundson A, Holtkamp B, Rivera E, Finifter M, Mettler A, Wagner D (2013) An empirical study on the effectiveness of security code review. In: ESSoS ’13, Lecture Notes in Computer Science, vol 7781, pp 197–212. Springer Berlin Heidelberg – reference: Massacci F, Nguyen V (2010) Which is the right source for vulnerability studies?: An empirical analysis on mozilla firefox. In: MetriSec ’10. ACM – reference: Fang M, Hafiz M (2014) Discovering buffer overflow vulnerabilities in the wild: an empirical study. In: Morisio M, Dybå T, Torchiano M (eds) 2014 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM ’14, Torino, Italy, September 18–19, 2014, p 23. ACM – reference: Mell P, Scarfone K, Romanosky S (2007) CVSS: A complete guide to the Common Vulnerability Scoring System Version 2.0. Tech. rep., FIRST.org – reference: Frei S, Tellenbach B, Plattner B (2008) 0-day patch - Exposing vendors’ (In)security performance. BlackHat Europe – reference: Suto L (2007) Analyzing the effectiveness and coverage of Web application security scanners. Tech. rep., eEye Digital Security – reference: Anbalagan P, Vouk M (2009) Towards a unifying approach in understanding security problems. In: ISSRE’09. IEEE Press – reference: Scandariato R, Walden J, Joosen W (2013) Static analysis versus penetration testing: A controlled experiment. In: 2013 IEEE 24th international symposium on software reliability engineering (ISSRE), pp 451–460 – reference: Gopalakrishna R, Spafford E (2005) A trend analysis of vulnerabilities. Tech. rep., CERIAS – reference: Rutar N, Almazan C, Foster J (2004) A comparison of bug finding tools for Java. In: ISSRE ’04. IEEE Computer Society – reference: OkhraviHNicolDEvaluation of patch management strategiesInt J Comput Intell Theory Pract20083109117 – reference: Arora A, Krishnan R, Telang R, Yang Y (2004) Impact of vulnerability disclosure and patch availability - An empirical analysis. In: WEIS ’04 – reference: Open Web Application Security Project (OWASP) (2014) Owasp top ten 2013 project. https://www.owasp.org/index.php/Top_10_2013-Table_of_Contents – reference: Wilander J, Kamkar M (2003) A comparison of publicly available tools for dynamic buffer overflow prevention. In: NDSS ’03. The Internet Society – reference: Browne H, Arbaugh W, McHugh J, Fithen W (2001) A trend analysis of exploitations. In: IEEE S&P ’01. IEEE Computer Society – reference: Cova M, Leita C, Thonnard O, Keromytis A, Dacier M (2010) An analysis of rogue AV campaigns. In: Proceedings of the 13th international conference on Recent advances in intrusion detection, RAID’10. Springer-Verlag, Berlin, Heidelberg, pp 442–463 – reference: Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: Characterizing payments among men with no names. In: Proceedings of the 2013 conference on internet measurement conference, IMC ’13. ACM, New York, NY, USA, pp 127–140 – reference: Kanich C, Kreibich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S (2008) Spamalytics: An empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM conference on computer and communications security, CCS ’08. ACM, New York, NY, USA, pp 3–14 – reference: Wu Y, Gandhi R, Siy H (2010) Using semantic templates to study vulnerabilities recorded in large software repositories. In: SESS ’10. ACM – reference: TippingPoint Zero Day Initiative (ZDI). http://www.zerodayinitiative.com/ – reference: Patton M (2001) Qualitative Research & Evaluation Methods, 3 edn. Sage Publications Ltd., Singapore – reference: Layman L, Williams L, Amant R (2007) Toward reducing fault fix time: Understanding developer behavior for the design of automated fault detection tools. In: ESEM ’07. IEEE Computer Society – reference: Bosu A, Carver JC, Hafiz M, Hilley P, Janni D (2014) Identifying the characteristics of vulnerable code changes: An empirical study. In: 22nd ACM SIGSOFT international symposium on the foundations of software engineering, p To appear – reference: Cheswick B (1992) An evening with berferd in which a cracker is lured, endured, and studied. In: Proc. Winter USENIX Conference, pp 163–174 – reference: Austin A, Williams L (2011) One technique is not enough: A comparison of vulnerability discovery techniques. In: ESEM ’11 – reference: ArbaughWFithenWMcHughJWindows of vulnerability: A case study analysisComputer20003312525910.1109/2.889093 – reference: BacaDCarlssonBPetersenKLundbergLImproving software security with static automated code analysis in an industry settingSoftware—Practice and Experience201343325927910.1002/spe.2109 – reference: Schneier B (2000) Full disclosure and the window of exposure. Crypto-Gram Newsletter – reference: Finifter M, Akhawe D, Wagner D (2013) An empirical study of vulnerability rewards programs. In: USENIX Security’ 13. USENIX Association – reference: Johnson B, Song Y, Murphy-Hill E, Bowdidge R (2013) Why don’t software developers use static analysis tools to find bugs?. In: ICSE ’13. ACM – reference: BesseyABlockKChelfBChouAFultonBHallemSHenri-GrosCKamskyAMcPeakSEnglerDA few billion lines of code later: Using static analysis to find bugs in the real worldCommun ACM2010532667510.1145/1646353.1646374 – reference: Yin R (2011) Case Study Research: Design and Methods. Sage Publications Ltd, Singapore – reference: McQueen M, McQueen T, Boyer W, Chaffin M (2009) Empirical estimates and observations of 0-day vulnerabilities. In: HICSS ’09, pp 1 –12 – reference: Denzin N (1978) The Research Act: A Theoretical Introduction to Sociological Methods. McGraw-Hill, New York – reference: Weinstein M (2012) TAMS Analyzer for Macintosh OS X: The native open source, Macintosh qualitative research tool – reference: SecurityFocus Bugtraq vulnerability list. http://www.securityfocus.com/ – reference: Verisign iDefense security intelligence services. http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/index.xhtml – reference: Xiao S, Witschey J, Murphy-Hill E (2014) Social influences on secure development tool adoption: Why security tools spread. In: CSCW ’14. ACM, New York, NY, USA, pp 1095–1106 – reference: Saldana J (2009) The Coding Manual for Qualitative Researchers. Sage Publications Ltd, Singapore – reference: Doupé A, Cova M, Vigna G (2010) Why Johnny can’t Pentest: An analysis of black-box web vulnerability scanners. In: DIMVA ’10. Springer – reference: Aranda J, Venolia G (2009) The secret life of bugs: Going past the errors and omissions in software repositories. In: ICSE ’09. IEEE Computer Society – reference: Krippendorff K (2004) Content Analysis: An Introduction to Its Methodology. Sage Publications Ltd., Singapore – ident: 9403_CR23 doi: 10.1145/1455770.1455774 – ident: 9403_CR12 doi: 10.1007/978-3-642-15512-3_23 – ident: 9403_CR20 – ident: 9403_CR15 doi: 10.1007/978-3-642-36563-8_14 – ident: 9403_CR24 – volume: 53 start-page: 66 issue: 2 year: 2010 ident: 9403_CR8 publication-title: Commun ACM doi: 10.1145/1646353.1646374 – ident: 9403_CR18 – ident: 9403_CR43 – ident: 9403_CR3 doi: 10.1109/ICSE.2009.5070530 – ident: 9403_CR6 doi: 10.1109/ESEM.2011.18 – ident: 9403_CR47 doi: 10.1145/1809100.1809104 – ident: 9403_CR2 doi: 10.1109/ISSRE.2009.25 – ident: 9403_CR11 – volume: 43 start-page: 259 issue: 3 year: 2013 ident: 9403_CR7 publication-title: Software—Practice and Experience doi: 10.1002/spe.2109 – ident: 9403_CR26 doi: 10.1145/1853919.1853925 – ident: 9403_CR29 doi: 10.1145/2504730.2504747 – ident: 9403_CR30 – ident: 9403_CR19 – ident: 9403_CR27 – ident: 9403_CR44 – ident: 9403_CR48 doi: 10.1145/2531602.2531722 – ident: 9403_CR40 – ident: 9403_CR25 doi: 10.1109/ESEM.2007.11 – ident: 9403_CR22 doi: 10.1109/ICSE.2013.6606613 – ident: 9403_CR37 – ident: 9403_CR33 – ident: 9403_CR41 doi: 10.1109/ICSE.2012.6227141 – ident: 9403_CR34 doi: 10.1109/ISSRE.2004.1 – ident: 9403_CR49 – ident: 9403_CR45 – ident: 9403_CR42 doi: 10.1016/S1353-4858(07)70094-6 – ident: 9403_CR14 doi: 10.1007/978-3-642-14215-4_7 – ident: 9403_CR10 doi: 10.1109/SECPRI.2001.924300 – ident: 9403_CR13 – ident: 9403_CR32 – ident: 9403_CR39 doi: 10.1109/IMF.2009.15 – ident: 9403_CR46 – ident: 9403_CR21 – ident: 9403_CR16 doi: 10.1145/2652524.2652533 – ident: 9403_CR17 – ident: 9403_CR36 doi: 10.1109/ISSRE.2013.6698898 – ident: 9403_CR1 doi: 10.1109/RAMS.2006.1677355 – volume: 33 start-page: 52 issue: 12 year: 2000 ident: 9403_CR4 publication-title: Computer doi: 10.1109/2.889093 – volume: 3 start-page: 109 year: 2008 ident: 9403_CR31 publication-title: Int J Comput Intell Theory Pract – ident: 9403_CR35 – ident: 9403_CR28 – ident: 9403_CR9 doi: 10.1145/2635868.2635880 – ident: 9403_CR5 – ident: 9403_CR38 doi: 10.1007/978-3-642-27576-0_24 – ident: 9403_CR50 doi: 10.1007/978-3-642-23088-2_15 |
| SSID | ssj0009745 |
| Score | 2.2691946 |
| Snippet | There is little or no information available on what actually happens when a software vulnerability is detected. We performed an empirical study on reporters of... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1920 |
| SubjectTerms | Communities Compilers Computer information security Computer programs Computer Science Cybersecurity Developers Games Interpreters Programming Languages Query languages Repositories Security Software Software Engineering/Programming and Operating Systems |
| Title | Game of detections: how are security vulnerabilities discovered in the wild? |
| URI | https://link.springer.com/article/10.1007/s10664-015-9403-7 https://www.proquest.com/docview/2063792005 https://www.proquest.com/docview/1835600894 |
| Volume | 21 |
| WOSCitedRecordID | wos000382017100002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: Springer Nature - Connect here FIRST to enable access customDbUrl: eissn: 1573-7616 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009745 issn: 1382-3256 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB509eDFt7i6SgRPSiHbNknjRUR8HEQEH-yt5FVcWFvZ7urfd9JtXRUV9FiapmWSmXzTmfkGYF9bFSJuzwJunQhiqVGluMZLEcuMaxZm3FTNJsT1ddLryZu6jrtsst2bkGRlqT8Uu3HuMyZYIGMaBWIW5pgnm_Eu-u3DlGlXVJ2JPbdeEOGB3oQyv5vi82E0RZhfgqLVWXO-9K-vXIbFGlqSk8leWIEZl6_CUtO2gdRavAZXF-rJkSIj1o2qRKy8PCKPxStRQ0fKup8deRkPPCF1lTuL3jTx5bs-3dNZ0s8JwkaCKNser8P9-dnd6WVQN1UITBTLUYAwVXBqEma055IzXEXoU0mHrp_WSTd2SnDdzTLLTFdYFRkVUpZY6oSjScZYtAGtvMjdJhCGxiCyMrSa-bCwlqGjjBoEXJpmWnXbQBvppqZmHPeNLwbplCvZSytFaaVeWqlow8H7I88Tuo3fBneaJUtrzSvTEDGXkP5fWRv23m-jzvhAiMpdMS5TNGMe6CUybsNhs4zTKX584dafRm_DAqIrPsn860BrNBy7HZg3L6N-OdytNu0b2ILk4A |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS-QwFD54A_fFy6rseNsIPimFTNskjS8i4o0dB8ELvoXcioJ2lumM-_c96bTOKiroY2malpOc5Ds9J98HsG2cjhG35xF3XkSpNOhS3OClSGXODYtzbiuxCdHtZre38qI-x1021e5NSrJaqf877MZ5qJhgkUxpEolJmE6Dyk4I0S9vxky7olImDtx6UYIbepPKfK-L15vRGGG-SYpWe83x_Le-cgHmamhJDkZzYREmfPET5hvZBlJ78RJ0TvSjJ72cOD-oCrGKco_c9f4R3fekrPXsyNPwIRBSV7WzGE2TcHw3lHt6R-4LgrCRIMp2-8twfXx0dXga1aIKkU1SOYgQpgpObcasCVxylusEYyrpMfQzJmunXgtu2nnumG0LpxOrY8oyR73wNMsZS1ZgqugV_hcQhotB4mTsDAtpYSNjTxm1CLgMzY1ut4A21lW2ZhwPwhcPasyVHKyl0FoqWEuJFuy8PPJ3RLfxWeP1ZshU7XmlihFzCRn-lbVg6-U2-kxIhOjC94alwmUsAL1Mpi3YbYZx3MWHL1z9UuvfMHt6dd5RnbPunzX4gUiLj6oA12Fq0B_6DZixT4P7sr9ZTeBnm1rnxA |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NT9wwEB3xUVVcCrRFLKXgSj1RRXiT2I57qRBlaQVaoZYibpY_BRJk0SZL_37H2YSFqkVCHKM4TjT22G8y4_cAPhqnU8TtIeHOiySXBl2KG7wUuQzcsDRw24hNiOGwOD-XJ63OadVVu3cpyemZhsjSVNa7Ny7s3jv4xnmsnmCJzGmWiHlYzDGQiTVdP36ezVh3RaNSHHn2kgw39y6t-a8uHm5MM7T5V4K02XcGy8_-4hV41UJOsjedI6sw58vXsNzJOZDWu9_A8aG-9mQUiPN1U6BVVp_Jxeg30WNPqlbnjtxOriJRdVNTi1E2icd6Yxmod-SyJAgnCaJv9-Ut_BocnO5_S1qxhcRmuawThK-CU1swayLHnOU6w1hLegwJjSn6udeCm34Ijtm-cDqzOqWscNQLT4vAWLYGC-Wo9OtAGC4SmZOpMyymi41MPWXUIhAzNBjd7wHtLK1sy0QeBTGu1IxDOVpLobVUtJYSPdi5e-RmSsPxWOPNbvhU65GVShGLCRn_ofXgw91t9KWYINGlH00qhctbBICFzHvwqRvSWRf_feHGk1pvw8uTrwN1_H149A6WEIDxaXHgJizU44l_Dy_sbX1ZjbeaufwH8I_wqA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Game+of+detections%3A+how+are+security+vulnerabilities+discovered+in+the+wild%3F&rft.jtitle=Empirical+software+engineering+%3A+an+international+journal&rft.au=Hafiz%2C+Munawar&rft.au=Fang%2C+Ming&rft.date=2016-10-01&rft.pub=Springer+US&rft.issn=1382-3256&rft.eissn=1573-7616&rft.volume=21&rft.issue=5&rft.spage=1920&rft.epage=1959&rft_id=info:doi/10.1007%2Fs10664-015-9403-7&rft.externalDocID=10_1007_s10664_015_9403_7 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-3256&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-3256&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-3256&client=summon |