Fig. 1. The whole process of the proposed method
Fig. 2. The detail process of the proposed method
Fig. 3. Setting the rules
Fig. 4. The Process of Result Categorization
Fig. 5. The Process of Mapping Unavailable Module
Fig. 6. The Process of Mapping Available Module
Fig. 7. Custom Rule Creation Example(XSS)
Fig. 8. Detail results for Application Vulnerability Analysis
Fig. 9. Details of Detection Vulnerability based on Source Code
Table 1. The process of matching vulnerabilities of the same cause after dynamic and static analysis
Table 2. The ways to describe final vulnerability scores by sections of mid scores
Table 3. Vulnerability Analysis Tools used for Test bed
Table 5. Comparison of number of vulnerability detection when compared to existing static tool
Table 6. Comparison of vulnerable detection numbers when compared with existing dynamic module
References
- Luca Allodi and Fabio Massacci, "Comparing Vulnerability Severity and Exploits Using Case-Control Studies," Journal of ACM Transactions on Information and System Security (TISSEC), Vol. 17, Issue 1, pp. 1-12, August, 2014. DOI: https://dx.doi.org/10.1145/2630069
- More Secure Software, https://www.microsoft.com/en-us/sdl/about/benefits.aspx, Date accessed: May, 2016.
- Sam Ransbotham and Sabyasachi Mitra, The Impact of Immediate Disclosure on Attack Diffusion and Volume, Economics of Information Security and Privacy III, Springer, New York, pp.1-12, 2013.
- Introduction To ISO 27005(ISO27005), http://www.27000.org/iso-27005.htm, Date accessed: May, 2016.
- Agawal, Monica, Singh, Abhinav, Metasploit Penetration testing Cookbook(Second Edition), Packt Publishing, UK, pp.23-50, Oct., 2013.
- CVE(Common Vulnerabilities and Exposures), http://cve.mitre.org/, Date accessed: May, 2016.
- Common Weakness Scoring System(CWSS), http://cwe.mitre.org/cwss/cwss_v1.0.1.html/, May, 2016.
- Joon-Ho Kim, A study of utilization of source code security vulnerabilities detection tools and improving tools by using symbolic execution engine, Master's Thesis, Department of Information Protection Graduate School, Soongsil University, pp.9-15, Jun, 2015.
- Seokmo Kim, A Study of Dynamic Analysis Compensation of Over-detection Problem of Static Analysis : In Case of Software Vulnerability Detection, Master's Thesis, Department of Computer Science and Engineering Graduate School, Dankook University, pp.14-15, Dec., 2015.
- M. D. Ernst, "Static and dynamic analysis: synergy and duality", In Proceedings of the ICSE Workshop on Dynamic Analysis(WODA '03), pp.24-27, 2003.
- Ari Takanen, Jared D. DeMott and Charles Miller, Fuzzing for Software Security Testing and Quality Assurance, Artech House Publishers, UK, pp.80-84, 2008.