Electrotechnical and Computer Engineering
Vol. 35 No. 01 (2020): Proceedings of the Faculty of Technical Sciences
SOFTWARE VULNERABILITY MANAGEMENT SYSTEM
Abstract
This paper presents implementation of the Software Vulnerability Management System. Description of the mechanisms for detecting publicly known vulnerabilities is given.
References
[1] Rosziati Ibrahim, Siow Yen Yen, „Formalization of the data flow diagram rules for consistency check“, Internationanal Journal of Software Engineering & Applications (IJSEA), 2010
[2] Suvda Myagmar, Adam J. Lee, William Yurcik, „Threat Modeling as a Basic for Security Requirements“, National Center for Supercomputing Applications (NCSA)
[3] Adam Shostack, „Experiences Threat Modeling in Microsoft“, Microsoft
[4] Marwan Abi-Antoun, Daniel Wang, Peter Torr, „Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security“
[5] https://nvlpubs.nist.gov/nistpubs/Legacy/IR/nistir7695.pdf (приступљено у септембру 2019)
[6] CVE Official Specification, https://cve.mitre.org/
[7] https://nvd.nist.gov/general (приступљено у септембру 2019)
[8] Clement Elbaz, Louis Rilling, Christine Moris, „Towards Automated Risk Analysis of "One-day" Vulnerabilities“
[9] https://www.first.org/cvss/specification-document (приступљено у септембру 2019)
[10] https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool (приступљено у септембру 2019)
[11] Немања Миладиновић, Проналажење рањивости у софтверу на основу дијаграма тока података, Fakultet tehničkih nauka, Novi Sad, 2017.