Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

Cobleigh, Alexander ; Hell, Martin LU ; Karlsson, Linus LU orcid ; Reimer, Oscar LU ; Sönnerup, Jonathan LU and Wisenhoff, Daniel LU (2018)
Abstract
We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated... (More)
We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated long term effect is more secure products. (Less)
Abstract (Swedish)
We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated... (More)
We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated long term effect is more secure products. (Less)
Please use this url to cite or link to this publication:
author
; ; ; ; and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
IEEE 22nd International Enterprise Distributed Object Computing Workshop
pages
4 pages
publisher
IEEE - Institute of Electrical and Electronics Engineers Inc.
external identifiers
  • scopus:85058977201
ISBN
978-1-5386-4141-5
DOI
10.1109/EDOCW.2018.00038
project
Säkra mjukvaruuppdateringar för den smarta staden
SECONDS: Secure Connected Devices
language
English
LU publication?
yes
id
3ea97fa3-931f-491a-8308-4bb7de87e21c
date added to LUP
2018-08-08 11:20:40
date last changed
2022-05-03 05:23:46
@inproceedings{3ea97fa3-931f-491a-8308-4bb7de87e21c,
  abstract     = {{We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated long term effect is more secure products.}},
  author       = {{Cobleigh, Alexander and Hell, Martin and Karlsson, Linus and Reimer, Oscar and Sönnerup, Jonathan and Wisenhoff, Daniel}},
  booktitle    = {{IEEE 22nd International Enterprise Distributed Object Computing Workshop}},
  isbn         = {{978-1-5386-4141-5}},
  language     = {{eng}},
  publisher    = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}},
  title        = {{Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code}},
  url          = {{https://lup.lub.lu.se/search/files/78489087/Identifying_Prioritizing_and_Evaluating_Vulnerabilities_in_Third_Party_Code.pdf}},
  doi          = {{10.1109/EDOCW.2018.00038}},
  year         = {{2018}},
}