Determinants of the Ease of Hacking
Software security is a problem. Software development mistakes end up as vulnerabilities that can be exploited. The easier a software exploit makes attacking a target, the less skilled people are able to do it. Various prioritisation systems exist to address software security issues. The author of th...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
KTH, Industrial Information and Control Systems
2012
|
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98489 |
id |
ndltd-UPSALLA1-oai-DiVA.org-kth-98489 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-kth-984892012-07-03T16:41:45ZDeterminants of the Ease of HackingengVälja, MargusKTH, Industrial Information and Control Systems2012Software security is a problem. Software development mistakes end up as vulnerabilities that can be exploited. The easier a software exploit makes attacking a target, the less skilled people are able to do it. Various prioritisation systems exist to address software security issues. The author of this paper finds that they are either too complex and hard to access, or product specific. This thesis takes a whole new approach to the prioritisation by studying exploit completeness and the factors that relate to it. First an exploit completeness scale is constructed, then the author conducts a study to analyse vulnerability and exploit data with statistical methods. The results show that seven factors influence exploit completeness. Five factors are used to build a linear regression model for completeness prediction. The time needed to collect the data for the factors is measured. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98489EES Examensarbete / Master Thesis ; XR-EE-ICS 2012:007application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
description |
Software security is a problem. Software development mistakes end up as vulnerabilities that can be exploited. The easier a software exploit makes attacking a target, the less skilled people are able to do it. Various prioritisation systems exist to address software security issues. The author of this paper finds that they are either too complex and hard to access, or product specific. This thesis takes a whole new approach to the prioritisation by studying exploit completeness and the factors that relate to it. First an exploit completeness scale is constructed, then the author conducts a study to analyse vulnerability and exploit data with statistical methods. The results show that seven factors influence exploit completeness. Five factors are used to build a linear regression model for completeness prediction. The time needed to collect the data for the factors is measured. |
author |
Välja, Margus |
spellingShingle |
Välja, Margus Determinants of the Ease of Hacking |
author_facet |
Välja, Margus |
author_sort |
Välja, Margus |
title |
Determinants of the Ease of Hacking |
title_short |
Determinants of the Ease of Hacking |
title_full |
Determinants of the Ease of Hacking |
title_fullStr |
Determinants of the Ease of Hacking |
title_full_unstemmed |
Determinants of the Ease of Hacking |
title_sort |
determinants of the ease of hacking |
publisher |
KTH, Industrial Information and Control Systems |
publishDate |
2012 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98489 |
work_keys_str_mv |
AT valjamargus determinantsoftheeaseofhacking |
_version_ |
1716392673052459008 |