首页> 外文会议>Annual International Conference on Privacy, Security and Trust >Analysing Vulnerability Reproducibility for Firefox Browser
【24h】

Analysing Vulnerability Reproducibility for Firefox Browser

机译:分析Firefox浏览器的漏洞再现性

获取原文

摘要

Fixing some security failures are difficult because they cannot be easily reproduced. To address Hardly Reproducible Vulnerabilities (HRVs), security experts spend a significant amount of time, effort, and budget. Sometimes they do not succeed in the reproduction step and ignore some security failures. The exploitation of a vulnerability due to its irreproducibility may cause severe consequences. An efficient solution is to explore the behaviour of both hardly and easily reproducible security issues at the code level. We use linear regression techniques to build models based on the classical software complexity metrics and a set of attributes related to the environment of the system. The results show that the considered metrics and the vulnerability types do not have significant linear correlations with each other. Also, predicting the HRV-prone parts of large systems is a great help for security experts to focus their effort on the top-ranked vulnerable files. After identifying the suitable indicators based on linear regression, different machine learning techniques such as Random Forest, Logistic Regression, C4.5 Decision Tree, and Naive Bayes are employed to build HRV prediction models. The Random Forest technique achieves the precision of 82% and recall of 84% to classify vulnerable files into HRV-prone or non HRV-prone files. We believe that the results encourage the use of software metrics for vulnerability prediction in some projects.
机译:修复某些安全失败很困难,因为它们不能轻易复制。为了解决几乎无法再现的漏洞(HRV),安全专家花费大量的时间,努力和预算。有时它们在再现步骤中没有成功,忽略某些安全失败。由于其IRREPRODUICALIBES对漏洞的利用可能导致严重后果。有效的解决方案是在代码级别探讨几乎不可再现的安全问题的行为。我们使用线性回归技术来构建基于经典软件复杂度指标的模型和与系统环境相关的一组属性。结果表明,考虑的指标和漏洞类型彼此没有显着的线性相关性。此外,预测大型系统的HRV易于部分是安全专家的巨大帮助,将他们的努力集中在排名第一的弱势档案上。在识别基于线性回归的合适指标之后,采用不同的机器学习技术,例如随机森林,逻辑回归,C4.5决策树和幼稚贝叶斯来构建HRV预测模型。随机森林技术实现了82%的精度,并回忆84%,以将易受攻击的文件分类为HRV-Prone或非HRV-Prone文件。我们认为,结果鼓励在某些项目中使用软件指标进行漏洞预测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号