Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types

Published

Author(s)

Peter M. Mell, Assane Gueye

Abstract

The Common Weakness Enumeration (CWE) is a prominent list of software weakness types. This list is used by vulnerability databases to describe the underlying security flaws within analyzed vulnerabilities. This linkage opens the possibility of using the analysis of software vulnerabilities to identify the most significant weaknesses that enable those vulnerabilities. We accomplish this through creating mashup views combining CWE weakness taxonomies with vulnerability analysis data. The resulting graphs have CWEs as nodes, edges derived from multiple CWE taxonomies, and nodes adorned with vulnerability analysis information (propagated from children to parents). Using these graphs, we develop a suite of metrics to identify the most significant weakness types (using the perspectives of frequency, impact, exploitability, and overall severity).
Proceedings Title
COMPSAC 2020
Conference Dates
July 13-17, 2020
Conference Location
Madrid, -1
Conference Title
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)

Keywords

Metrics, Software flaws, Vulnerabilities
Created July 13, 2020, Updated July 30, 2020