Which is the right source for vulnerability studies?: an empirical analysis on Mozilla Firefox

  • Authors:
  • Fabio Massacci;Viet Hung Nguyen

  • Affiliations:
  • University of Trento, Italy;University of Trento, Italy

  • Venue:
  • Proceedings of the 6th International Workshop on Security Measurements and Metrics
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent years have seen a trend towards the notion of quantitative security assessment and the use of empirical methods to analyze or predict vulnerable components. Many papers focused on vulnerability discovery models based upon either a public vulnerability databases (e.g., CVE, NVD), or vendor ones (e.g., MFSA). Some combine these databases. Most of these works address a knowledge problem: can we understand the empirical causes of vulnerabilities? Can we predict them? Still, if the data sources do not completely capture the phenomenon we are interested in predicting, then our predictor might be optimal with respect to the data we have but unsatisfactory in practice. In our work, we focus on a more fundamental question: the quality of vulnerability database. We provide an analytical comparison of different security metric papers and the relative data sources. We also show, based on experimental data for Mozilla Firefox, how using different data sources might lead to completely different results.