Review of software security defects taxonomy

  • Authors:
  • Zhanwei Hui;Song Huang;Zhengping Ren;Yi Yao

  • Affiliations:
  • PLA Software Test and Evaluation Centre for Military Training, PLA University of Science and Technology, Nanjing, Jiangsu Province, PRC;PLA Software Test and Evaluation Centre for Military Training, PLA University of Science and Technology, Nanjing, Jiangsu Province, PRC;PLA Software Test and Evaluation Centre for Military Training, PLA University of Science and Technology, Nanjing, Jiangsu Province, PRC;PLA Software Test and Evaluation Centre for Military Training, PLA University of Science and Technology, Nanjing, Jiangsu Province, PRC

  • Venue:
  • RSKT'10 Proceedings of the 5th international conference on Rough set and knowledge technology
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

An organized list of actual defects can be useful for software security test (SST). In order to target their technology on a rational basis, it would be useful for security testers to have available a taxonomy of software security defects organizing the problem space. Unfortunately, the only existing suitable taxonomies are mostly for tool-builders and software designers, or based on vulnerabilities and security errors, and do not adequately represent security defects that are found in modern software. In our work, we have reviewed the traditional software security errors or vulnerabilities taxonomies. Based on analyzing in its target, motivation and insufficiency, we have compared 9 kinds of taxonomies, which would be useful for defects based software security testing.