An Empirical Investigation on Vulnerability for Software Companies

An Empirical Investigation on Vulnerability for Software Companies

Jianping Peng, Guoying Zhang, Chun-Hung Chiu
DOI: 10.4018/IJSSSP.304894
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This research analyzes software vulnerability information from the perspective of software companies. A total of 13019 vulnerabilities from 136 software companies were collected from a public vulnerability database. A latent class model classifies the companies into three classes based on vulnerability information during a five-year period, and then three class-specific models pinpoint the most significant key features of vulnerabilities for each class. A class I company can reduce vulnerability level if it puts focus on "boundary condition errors," "input validation errors," and "exception handling errors." A class II company needs to emphasize "access validation errors" and "race condition errors." Interestingly, a class III company needs to avoid any potential "origin validation errors," "boundary condition errors," "design errors," and "access validation errors." With these significant key features information, software companies can effectively reduce vulnerability by managing related errors throughout the development and testing process.
Article Preview
Top

1. Introduction

Information security is one of the most critical concerns for organizations (Soomro et al., 2016; Toutouh et al., 2018; Muñoz et al., 2013). With the extensive use of information systems and software applications, software vulnerability has become an essential component of information security. Software vulnerability often refers to software coding and implementation defects, leading to malicious exploits of systems and incidents regarding confidentiality, integrity, and availability of data and systems. These defects range from safety-related design errors, coding defects, and operation faults in the software life cycle (Luo et al., 2020).

Software vulnerabilities can present significant risks for the organization; therefore, investigating vulnerability characteristics can be highly valuable in predicting future vulnerabilities (Spanos and Angelis, 2018). In order to manage software vulnerability, public databases were established to collect vulnerability information such as features (errors), descriptions, severity level, root cause, exploitation type, the scope of vulnerabilities, among others. One notable example is the National Vulnerability Database (NVD), established by the National Institute of Standards and Technology of the United States. Since its inception in 1999, NVD has published information about over 150,000 software vulnerabilities affecting numerous software applications (http://www.cnnvd.org.cn/). The rapid growth of software vulnerabilities leads to many critical data breaches, causing substantial reputational and financial losses.

With the availability of software vulnerability information, analysis of this information plays a critical role in preventing and mitigating security exploits. One popular research stream of the literature focuses on vulnerability classification and prediction based on historical data (Zhang et al., 2011; Li et al., 2017; Murtaza et al., 2016; Spanos and Angelis, 2018; Huang et al., 2019). Most research intends to build models to classify vulnerabilities and predict potential new vulnerabilities in software products. For example, Murtaza et al. (2016) investigate the historical patterns of vulnerabilities to predict future vulnerabilities in software applications, utilizing the National Vulnerability Database (NVD) information. The study shows that the same vulnerabilities feature (e.g., buffer errors) may repeatedly occur hundreds of times in a software product. While it is essential to analyze vulnerability characteristics shown in software products or applications from a public or generic perspective, it is also intuitive to investigate this problem at a firm level: can we explore vulnerability features by the software development companies?

This study focuses on software development companies to investigate vulnerability features and characteristics. In fact, from a software company's perspective, reducing vulnerability helps improve its software quality and promotes a reliable and trustworthy reputation. In other words, software companies should be motivated to analyze and manage software vulnerabilities effectively. However, few studies have ever investigated the vulnerability information from a software company's perspective to our best knowledge.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 12: 2 Issues (2021)
Volume 11: 2 Issues (2020)
Volume 10: 2 Issues (2019)
Volume 9: 4 Issues (2018)
View Complete Journal Contents Listing