期刊文献+

软件漏洞发现概率及最优投入水平的研究 被引量:3

Research on Probability of Software Bugs Detection and Optimal Investment Level
下载PDF
导出
摘要 针对软件漏洞信息市场理论模型中黑客利用漏洞信息攻击软件使用者的收益函数不够完善的缺陷,提出基于黑客与软件测试者之间竞争机制的一个改进模型,分析黑客与各市场参与者发现软件漏洞信息的概率与最优投入水平。测试结果表明,软件漏洞测试者和黑客的投入水平分别由中介商对软件测试者激励的大小和对软件使用者索价的高低所决定。此项研究为实现更有效的软件漏洞市场监控和管理提供有益的参考。 Considering the faultiness of the hackers' profit function by attacking the software users through exploiting bugs in the current software bugs information market, an improved pattern is advanced based on the competition mechanism between the hackers and testers, the hackers and the other participant's detection probability of software bugs and their optimal investment level are analyzed. Test results show that the efforts of hacker and tester are determined by intermediaries' incentives to the tester and the charge to the users respectively. This research gives a good reference in the monitoring and management of the software bugs information market more effectively.
作者 曾霞 周四清
出处 《计算机工程》 CAS CSCD 北大核心 2010年第12期173-175,共3页 Computer Engineering
基金 广东省软科学基金资助项目"无线传感器网络关键技术自主创新与产业化战略研究"(2008B070800029) 暨南大学引进优秀人才科研启动基金资助项目"网络环境下信息安全传输与信息隐蔽理论 技术及其应用"(51205068)
关键词 信息安全 软件漏洞 激励机制 information security: software bugs: incentive mechanism
  • 相关文献

参考文献6

  • 1魏瑜豪,张玉清.基于Fuzzing的MP3播放软件漏洞发掘技术[J].计算机工程,2007,33(24):158-160. 被引量:28
  • 2Schechter S E.How to Buy Better Testing:Using Competition to Get the Most Security and Robustness for Your Dollur[C] //Proc.of Infrastructure Security Conference.Bristol,UK:[s.n.] ,2002:97-113. 被引量:1
  • 3Schechter S E.Quantitatively Differentiating System Securityl[C] //Proc.of the 1st Workshop on Economics and Information Security.Berkeley,CA,USA:[s.n.] ,2002:163-179. 被引量:1
  • 4Schechter S E.Computer Security Strength&Risk:A Quantitative Approach[D].Cambridge,USA:Harvard University,2004. 被引量:1
  • 5Kannan K,Telang R.An Economic Analysis of Market for Software Vulnerabilities[C] //Proc.of the 3rd Workshop on Economics and Information Security.Minneapolis,USA:[S.n,] ,2004:213-224. 被引量:1
  • 6李淼,吴世忠.软件漏洞起因的分类研究[J].计算机工程,2006,32(20):163-165. 被引量:3

二级参考文献11

  • 1Bishop M.Vulnerability Analysis[C].Proceedings of Recent Advances in Intrusion Detection,1999:125-136. 被引量:1
  • 2Landwehr C,Bull A,Mcdermott J,et al.A Taxonomy Computer Program Security Flaws,with Example[J].ACM Computing Surveys,1994,26(3):211-255. 被引量:1
  • 3Krsul I,Spafford E,Tripunitara M.Computer Vulnerability Analysis[R].West Lafayette:COAST Laboratory,Purdue University,Technical Report:COAST TR98-07,1998-05. 被引量:1
  • 4Aslam T,Krsul I,Spafford E.A Taxonomy of Security Faults[C].Proceedings of the 19th National Information Systems Security Conference,Baltimore,Maryland,1996-10. 被引量:1
  • 5Anderson R.Security Engineering,A Guide Building Dependable Distributed Systems[M].John Wiley & Sons,2001. 被引量:1
  • 6Gollmann D.Computer Security[M].John Wiley & Sons,2000. 被引量:1
  • 7Viega J,McGraw G.Building Secure Software[M].Addison-Wesley,2002. 被引量:1
  • 8Schneier B.Secrets and Lies:Digital Security in a Networked World[M].John Wiley & Sons,2000. 被引量:1
  • 9Cowan C,Wagle P,Pu C,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade[C]//Proc.of DARPA Information Survivability Conference and Exposition.[S.l.]:DARPA Press,2000. 被引量:1
  • 10Du Wenliang,Mathur A P.Vulnerability Testing of Software System Using Fault Injection[R].Coast,TR 98-02,1998. 被引量:1

共引文献29

同被引文献15

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部