A TAXONOMY OF COMPUTER-PROGRAM SECURITY FLAWS

被引:180
作者
LANDWEHR, CE
BULL, AR
MCDERMOTT, JP
CHOI, WS
机构
[1] Informatmn Technology Division, Naval Research Laboratory, Washington
关键词
ERROR DEFECT CLASSIFICATION; SECURITY FLAW; TAXONOMY;
D O I
10.1145/185403.185412
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An organized record of actual flaws can be useful to computer system designers, programmers, analysts, administrators, and users. This survey provides a taxonomy for computer program security flaws, with an Appendix that documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places. For those new to the field of computer security, they provide a good introduction to the characteristics of security flaws and how they can arise. Because these flaws were not randomly selected from a valid statistical sample of such flaws, we make no strong claims concerning the likely distribution of actual security flaws within the taxonomy. However, this method of organizing security flaw data can help those who have custody of more representative samples to organize them and to focus their efforts to remove and, eventually, to prevent the introduction of security flaws.
引用
收藏
页码:211 / 254
页数:44
相关论文
共 30 条
  • [1] ABBOTT RP, 1976, NBSIR761041 NAT BUR
  • [2] Anderson J. P., 1972, ESDTR7351
  • [3] Brehmer C. L., 1993, CROSS TALK J DEF SOF, V6, P9
  • [4] ORTHOGONAL DEFECT CLASSIFICATION - A CONCEPT FOR IN-PROCESS MEASUREMENTS
    CHILLAREGE, R
    BHANDARI, IS
    CHAAR, JK
    HALLIDAY, MJ
    MOEBUS, DS
    RAY, BK
    WONG, MY
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1992, 18 (11) : 943 - 956
  • [5] COHEN F, 1984, 7TH P NAT COMP SEC C, P240
  • [6] Denning D.E.R., 1982, CRYPTOGRAPHY DATA SE, V112, DOI [10.5555/539308, DOI 10.5555/539308]
  • [7] DENNING PJ, 1988, AM SCI, V76, P236
  • [8] ELMERDEWITT P, 1988, TIME MAG 0926, P62
  • [9] Ferbrache D., 1992, PATHOLOGY COMPUTER V
  • [10] FLORAC WA, 1992, CMUSEI92TR22 SOFTW E