6 research outputs found

    Software Vulnerability Disclosure and its Impact on Exploitation: An Empirical Study

    Get PDF
    In a networked world, computer systems are highly exposed to the attacks of worms / viruses. Many of these attacks stem from the vulnerabilities in the software code. One of the issues that plagues the information security area is the publicly available information about the vulnerabilities in popular software applications. This information has been put to good as well as bad use by people in the technical community. Software vendors and the anti-virus companies develop patches to resolve the software vulnerability. Hackers and virus writers make use of the same information to write malicious code to exploit the vulnerability. This exploratory study analyzes whether the information availability has an impact on the exploitation of the vulnerability. This study also considers some of the characteristics of the vulnerability information and its impact on the exploitation. Two of the factors thus considered, namely, the criticality, and cumulativeness of the vulnerability was found to have a significant impact on the actual exploitation

    A Prospective Analysis of Security Vulnerabilities within Link Traversal-Based Query Processing (Extended Version)

    Full text link
    The societal and economical consequences surrounding Big Data-driven platforms have increased the call for decentralized solutions. However, retrieving and querying data in more decentralized environments requires fundamentally different approaches, whose properties are not yet well understood. Link Traversal-based Query Processing (LTQP) is a technique for querying over decentralized data networks, in which a client-side query engine discovers data by traversing links between documents. Since decentralized environments are potentially unsafe due to their non-centrally controlled nature, there is a need for client-side LTQP query engines to be resistant against security threats aimed at the query engine's host machine or the query initiator's personal data. As such, we have performed an analysis of potential security vulnerabilities of LTQP. This article provides an overview of security threats in related domains, which are used as inspiration for the identification of 10 LTQP security threats. Each threat is explained, together with an example, and one or more avenues for mitigations are proposed. We conclude with several concrete recommendations for LTQP query engine developers and data publishers as a first step to mitigate some of these issues. With this work, we start filling the unknowns for enabling querying over decentralized environments. Aside from future work on security, wider research is needed to uncover missing building blocks for enabling true decentralization.Comment: This is an extended version of an article with the same title published in the proceedings of the QuWeDa workshop at ISWC 2022. Next to more details in the related work and conclusions sections, this extension introduces concrete mitigations of each vulnerabilit

    Enabling Technologies of Cyber Crime: Why Lawyers Need to Understand It

    Get PDF
    This Article discusses the enabling technologies of cyber crime and analyzes their role in the resolution of related legal issues. It demonstrates the translation of traditional legal principles to a novel technological environment in a way that preserves their meaning and policy rationale. It concludes that lawyers who fail to understand the translation will likely pursue a suboptimal litigation strategy, face speculative recovery prospects, and may overlook effective and potentially powerful defenses

    A review of attack graph and attack tree visual syntax in cyber security

    Get PDF
    Perceiving and understanding cyber-attacks can be a difficult task, and more effective techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) - such as attack graphs, attack trees and fault trees, are a popular method of mathematically and visually representing the sequence of events that lead to a successful cyber-attack. These methods are useful visual aids that can aid cyber-attack perception. This survey paper describes the fundamental theory of cyber-attack before describing how important elements of a cyber-attack are represented in attack graphs and attack trees. The key focus of the paper is to present empirical research aimed at analysing more than 180 attack graphs and attack trees to identify how attack graphs and attack trees present cyber-attacks in terms of their visual syntax. There is little empirical or comparative research which evaluates the effectiveness of these methods. Furthermore, despite their popularity, there is no standardised attack graph visual syntax configuration, and more than seventy self-nominated attack graph and twenty attack tree configurations have been described in the literature - each of which presents attributes such as preconditions and exploits in a different way. The survey demonstrates that there is no standard method of representing attack graphs or attack trees and that more research is needed to standardise the representation
    corecore