SOFTWARE VULNERABILITY MANAGEMENT SYSTEM

Authors

  • Maрија Ковачевић Autor

DOI:

https://doi.org/10.24867/06BE13Kovacevic

Keywords:

Threat modelling, Data flow diagram, Knowledge base, NVD, CPE, CVE, XML

Abstract

This paper presents implementation of the Software Vulnerability Management System. Description of the mechanisms for detecting publicly known vulnerabilities is given.

References

[1] Rosziati Ibrahim, Siow Yen Yen, „Formalization of the data flow diagram rules for consistency check“, Internationanal Journal of Software Engineering & Applications (IJSEA), 2010
[2] Suvda Myagmar, Adam J. Lee, William Yurcik, „Threat Modeling as a Basic for Security Requirements“, National Center for Supercomputing Applications (NCSA)
[3] Adam Shostack, „Experiences Threat Modeling in Microsoft“, Microsoft
[4] Marwan Abi-Antoun, Daniel Wang, Peter Torr, „Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security“
[5] https://nvlpubs.nist.gov/nistpubs/Legacy/IR/nistir7695.pdf (приступљено у септембру 2019)
[6] CVE Official Specification, https://cve.mitre.org/
[7] https://nvd.nist.gov/general (приступљено у септембру 2019)
[8] Clement Elbaz, Louis Rilling, Christine Moris, „Towards Automated Risk Analysis of "One-day" Vulnerabilities“
[9] https://www.first.org/cvss/specification-document (приступљено у септембру 2019)
[10] https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool (приступљено у септембру 2019)
[11] Немања Миладиновић, Проналажење рањивости у софтверу на основу дијаграма тока података, Fakultet tehničkih nauka, Novi Sad, 2017.

Published

2019-12-23

Issue

Section

Electrotechnical and Computer Engineering