Determinants of the Ease of Hacking

Software security is a problem. Software development mistakes end up as vulnerabilities that can be exploited. The easier a software exploit makes attacking a target, the less skilled people are able to do it. Various prioritisation systems exist to address software security issues. The author of th...

Full description

Bibliographic Details
Main Author: Välja, Margus
Format: Others
Language:English
Published: KTH, Industrial Information and Control Systems 2012
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98489
id ndltd-UPSALLA1-oai-DiVA.org-kth-98489
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-kth-984892012-07-03T16:41:45ZDeterminants of the Ease of HackingengVälja, MargusKTH, Industrial Information and Control Systems2012Software security is a problem. Software development mistakes end up as vulnerabilities that can be exploited. The easier a software exploit makes attacking a target, the less skilled people are able to do it. Various prioritisation systems exist to address software security issues. The author of this paper finds that they are either too complex and hard to access, or product specific. This thesis takes a whole new approach to the prioritisation by studying exploit completeness and the factors that relate to it. First an exploit completeness scale is constructed, then the author conducts a study to analyse vulnerability and exploit data with statistical methods. The results show that seven factors influence exploit completeness. Five factors are used to build a linear regression model for completeness prediction. The time needed to collect the data for the factors is measured. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98489EES Examensarbete / Master Thesis ; XR-EE-ICS 2012:007application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
description Software security is a problem. Software development mistakes end up as vulnerabilities that can be exploited. The easier a software exploit makes attacking a target, the less skilled people are able to do it. Various prioritisation systems exist to address software security issues. The author of this paper finds that they are either too complex and hard to access, or product specific. This thesis takes a whole new approach to the prioritisation by studying exploit completeness and the factors that relate to it. First an exploit completeness scale is constructed, then the author conducts a study to analyse vulnerability and exploit data with statistical methods. The results show that seven factors influence exploit completeness. Five factors are used to build a linear regression model for completeness prediction. The time needed to collect the data for the factors is measured.
author Välja, Margus
spellingShingle Välja, Margus
Determinants of the Ease of Hacking
author_facet Välja, Margus
author_sort Välja, Margus
title Determinants of the Ease of Hacking
title_short Determinants of the Ease of Hacking
title_full Determinants of the Ease of Hacking
title_fullStr Determinants of the Ease of Hacking
title_full_unstemmed Determinants of the Ease of Hacking
title_sort determinants of the ease of hacking
publisher KTH, Industrial Information and Control Systems
publishDate 2012
url http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98489
work_keys_str_mv AT valjamargus determinantsoftheeaseofhacking
_version_ 1716392673052459008