Design of exploitable automatic verification system for secure open source software
- Authors
- Kim, B.; Song, J.-H.; Park, J.-P.; Jun, M.-S.
- Issue Date
- 2015
- Publisher
- Springer Verlag
- Keywords
- Exploit; Exploitable; Exploitable verification; Open source; Software vulnerability
- Citation
- Lecture Notes in Electrical Engineering, v.373, pp.275 - 281
- Journal Title
- Lecture Notes in Electrical Engineering
- Volume
- 373
- Start Page
- 275
- End Page
- 281
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/9703
- DOI
- 10.1007/978-981-10-0281-6_40
- ISSN
- 1876-1100
- Abstract
- As more people use IT products, the application extent of software has increased along with demand for it. In addition to commercialized software, open source software is also seeing its market grow rapidly. But open source software is developed by those without expert knowledge in security. As a result, many security vulnerabilities arise and are taken advantage of for attacks. Therefore, in this paper, we suggested the design of an exploitable automatic verification system for secure open source software to address these issues. It is expected that, through the use of this system, the reliabilities of the open source software, the developers of the open source software, and the corporations using can be improved. © Springer Science+Business Media Singapore 2015.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Information Technology > School of Computer Science and Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/9703)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.