Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
(2018)- Abstract
- We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated... (More)
- We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated long term effect is more secure products. (Less)
- Abstract (Swedish)
- We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated... (More)
- We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated long term effect is more secure products. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/3ea97fa3-931f-491a-8308-4bb7de87e21c
- author
- Cobleigh, Alexander ; Hell, Martin LU ; Karlsson, Linus LU ; Reimer, Oscar LU ; Sönnerup, Jonathan LU and Wisenhoff, Daniel LU
- organization
- publishing date
- 2018
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- IEEE 22nd International Enterprise Distributed Object Computing Workshop
- pages
- 4 pages
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- external identifiers
-
- scopus:85058977201
- ISBN
- 978-1-5386-4141-5
- DOI
- 10.1109/EDOCW.2018.00038
- project
- Säkra mjukvaruuppdateringar för den smarta staden
- SECONDS: Secure Connected Devices
- language
- English
- LU publication?
- yes
- id
- 3ea97fa3-931f-491a-8308-4bb7de87e21c
- date added to LUP
- 2018-08-08 11:20:40
- date last changed
- 2022-05-03 05:23:46
@inproceedings{3ea97fa3-931f-491a-8308-4bb7de87e21c, abstract = {{We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated long term effect is more secure products.}}, author = {{Cobleigh, Alexander and Hell, Martin and Karlsson, Linus and Reimer, Oscar and Sönnerup, Jonathan and Wisenhoff, Daniel}}, booktitle = {{IEEE 22nd International Enterprise Distributed Object Computing Workshop}}, isbn = {{978-1-5386-4141-5}}, language = {{eng}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, title = {{Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code}}, url = {{https://lup.lub.lu.se/search/files/78489087/Identifying_Prioritizing_and_Evaluating_Vulnerabilities_in_Third_Party_Code.pdf}}, doi = {{10.1109/EDOCW.2018.00038}}, year = {{2018}}, }