|
OUSPG[This page is CSS2 enabled. Your browser might not fully support it] The Vulnerability Process: a tiger team approach ...$RCSfile: index.html,v $ $Revision: 1.3 $ $Date: 2000/08/09 19:17:51 $ ABSTRACTSecurity vulnerabilities that affect widely deployed software emerge frequently. Addressing these maladies requires coordination and communication. The purpose of this work was to explore a systematic approach to reporting and resolving vulnerability cases, from a tiger team perspective. A life-cycle model with checkpoint-based metrics was developed, a case study was carried out and observations were gathered. The vulnerability process was found to be complicated but manageable. The role of the FIRST teams as coordinators is encouraged and a shift from undisciplined, reactive vulnerability work towards a professional, proactive approach is promoted.
[This page is CSS2 enabled. Your browser might not fully support it] |
||||||