Despite years of intensive research in the field of software vulnerabilities discovery, exploits are becoming ever more common. Consequently, it is more necessary than ever to choose software configurations that minimize systems' exposure surface to these threats. In order to support users in assessing the security risks induced by their software configurations and in making informed decisions, we introduce M-STAR, a Modular Software Trustworthiness ARchitecture and framework for probabilistically assessing the trustworthiness of software systems, based on evidence, such as their vulnerability history and source code properties. Integral to M-STAR is a software trustworthiness model, consistent with the concept of computational trust. Comp...
One of the key processes in software development and information security management is the evaluati...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
Abstract—Trustworthiness of software and services is a key concern for their use and adoption by org...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
Users and administrators are often faced with the choice between different software solutions, somet...
This paper extends the software trustworthiness evidence framework to include the runtime software t...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
Abstract—(U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measur...
Recent large scale cyber security incidents such as the Equifax data breach, where the personal info...
Software vulnerabilities that enable well-known exploit techniques for committing computer crimes ar...
Vulnerability studies usually rely on the NVD or ‘proof-of-concept’ exploits databases (Exploit-db, ...
Meaningful metrics and methods for measuring software security would greatly improve the security of...
Abstract. In the near future, computing devices will be present in most artefacts, will considerably...
Many software development practices aim at ensuring that software is correct, or fault-free. In safe...
One of the key processes in software development and information security management is the evaluati...
One of the key processes in software development and information security management is the evaluati...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
Abstract—Trustworthiness of software and services is a key concern for their use and adoption by org...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
Users and administrators are often faced with the choice between different software solutions, somet...
This paper extends the software trustworthiness evidence framework to include the runtime software t...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
Abstract—(U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measur...
Recent large scale cyber security incidents such as the Equifax data breach, where the personal info...
Software vulnerabilities that enable well-known exploit techniques for committing computer crimes ar...
Vulnerability studies usually rely on the NVD or ‘proof-of-concept’ exploits databases (Exploit-db, ...
Meaningful metrics and methods for measuring software security would greatly improve the security of...
Abstract. In the near future, computing devices will be present in most artefacts, will considerably...
Many software development practices aim at ensuring that software is correct, or fault-free. In safe...
One of the key processes in software development and information security management is the evaluati...
One of the key processes in software development and information security management is the evaluati...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
Abstract—Trustworthiness of software and services is a key concern for their use and adoption by org...