期刊文献+

基于信息熵和攻击面的软件安全度量 被引量:9

Software security measurement based on information entropy and attack surface
下载PDF
导出
摘要 对软件实施安全度量是开发安全的软件产品和实施软件安全改进的关键基础。基于Manadhata等(MANADHATA P K,TAN K M C,MAXION R A,et al.An approach to measuring a system's attack surface,CMU-CS-07-146.Pittsburgh:Carnegie Mellon University,2007;MANADHATA P K,WING J M.An attack surface metric.IEEE Transactions on Software Engineering,2011,37(3):371-386)提出的攻击面方法,结合信息熵理论,提出结合信息熵和攻击面的软件安全度量方法,可以有效地利用信息熵的计算方法对软件攻击面的各项资源进行威胁评估,从而提供具有针对性的威胁指标量化权值。在此基础之上,通过计算软件攻击面各项资源的指标值可以实现软件的安全度量。最后,通过具体的实例分析说明结合信息熵和攻击面的方法可以有效地应用于软件的安全开发过程和软件安全改进过程,为软件的安全设计开发指明可能存在的安全威胁,帮助提早避免软件产品中可能存在的漏洞;而对于已经开发完成待实施安全改进的软件则可以指出明确的改进方向。 Software security measurement is critical to the development of software and improvement of software security. Based on the entropy and attack surface proposed by Manadhata et al. ( MANADHATA P K, TAN K M C, MAXION R A, et al. An approach to measuring a system's attack surface, CMU-CS-07-146. Pittsburgh: Carnegie Mellon University, 2007; MANADHATA P K, WING J M. An attack surface metric. IEEE Transactions on Software Engineering, 2011, 37(3) : 371 - 386), a method of software security measurement was used to assess the threat of the software's resources and provide the threat weight of these resources. Based on the threat weight, the attack surface metric was calculated for determining whether a software product is secure in design, or in what aspect the software product can be improved. The method is demonstrated in a case to show that, when using the method, the probable security threats can be found as early as possible to prevent from producing the software products that may have vulnerabilities, and the directions for the improvement of software security are pointed out clearly.
出处 《计算机应用》 CSCD 北大核心 2013年第1期19-22,48,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61262025 61262024) 云南省教育厅科学研究基金资助项目(2012Y257) 云南省软件工程重点实验室开放基金资助项目(2011SE09)
关键词 攻击面 软件安全度量 软件开发 软件安全改进 attack surface entropy software security measurement software development improvement of software security
  • 相关文献

参考文献19

  • 1Computing Research Association (CRA). Four grand challenges in trustworthy computing [ EB/OL]. [ 2012-04-16]. http://archive. cra. org/reports/trustworthy, computing, pdf.
  • 2BEN SWARUP M, SEETHA RAMAIAH P. An approach to model- ing software safety in safety-critical systems [ J]. Journal of Comput- er Science, 2009, 5(4): 311-322.
  • 3樊晓光,褚文奎,张凤鸣.软件安全性研究综述[J].计算机科学,2011,38(5):8-13. 被引量:22
  • 4CLIFTON A, ERICSON I I. Hazard analysis techniques for system safety [ M]. New York: John Wiley & Sons, 2005.
  • 5FENTON N, NEIL M. Measuring your risks: numbers that would make sense to Bruce Willis and his crew [ EB/OL]. [2010-04-07]. http://www, agenarisk, corn/resources/white _ papers/Measuring _ Risks. pdf.
  • 6郦萌.安全性苛求系统中关于软件安全性评价的研究[J].计算机工程与科学,2002,24(2):59-61. 被引量:9
  • 7陈鑫,王晓晗,黄河.基于威胁分析的多属性信息安全风险评估方法研究[J].计算机工程与设计,2009,30(1):38-40. 被引量:23
  • 8刘勇,林奇,孟坤.一种基于信息熵的企业信息系统的安全风险定量评估方法[J].计算机科学,2010,37(5):45-48. 被引量:14
  • 9ALBERTS C, ALLEN J, STODDARD R. Security measurement and analysis [ EB/OL]. [ 2012-03-20]. http://www, cert. org/archive/ pdf/SecurityMeasurementandAnalysis, pdf.
  • 10MANADHATA P K, TAN K M C, MAXION R A, et al. An ap- proach to measuring a system's attack surface, CMU-CS-07-146 [ R]. Pittsburgh: Carnegie Mellon University, 2007.

二级参考文献94

共引文献67

同被引文献91

引证文献9

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部