Title of article
A comparison of the efficiency and effectiveness of vulnerability discovery techniques
Author/Authors
Austin، نويسنده , , Andrew and Holmgreen، نويسنده , , Casper and Williams، نويسنده , , Laurie، نويسنده ,
Issue Information
ماهنامه با شماره پیاپی سال 2013
Pages
10
From page
1279
To page
1288
Abstract
Context
ty vulnerabilities discovered later in the development cycle are more expensive to fix than those discovered early. Therefore, software developers should strive to discover vulnerabilities as early as possible. Unfortunately, the large size of code bases and lack of developer expertise can make discovering software vulnerabilities difficult. A number of vulnerability discovery techniques are available, each with their own strengths.
ive
jective of this research is to aid in the selection of vulnerability discovery techniques by comparing the vulnerabilities detected by each and comparing their efficiencies.
ducted three case studies using three electronic health record systems to compare four vulnerability discovery techniques: exploratory manual penetration testing, systematic manual penetration testing, automated penetration testing, and automated static analysis.
s
case study, we found empirical evidence that no single technique discovered every type of vulnerability. We discovered that the specific set of vulnerabilities identified by one tool was largely orthogonal to that of other tools. Systematic manual penetration testing found the most design flaws, while automated static analysis found the most implementation bugs. The most efficient discovery technique in terms of vulnerabilities discovered per hour was automated penetration testing.
sion
sults show that employing a single technique for vulnerability discovery is insufficient for finding all types of vulnerabilities. Each technique identified only a subset of the vulnerabilities, which, for the most part were independent of each other. Our results suggest that in order to discover the greatest variety of vulnerability types, at least systematic manual penetration testing and automated static analysis should be performed.
Keywords
Penetration testing , static analysis , black box testing , white box testing , SECURITY , Vulnerability
Journal title
Information and Software Technology
Serial Year
2013
Journal title
Information and Software Technology
Record number
2375132
Link To Document