Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Design of exploitable automatic verification system for secure open source software

Authors
Kim, B.Song, J.-H.Park, J.-P.Jun, M.-S.
Issue Date
2015
Publisher
Springer Verlag
Keywords
Exploit; Exploitable; Exploitable verification; Open source; Software vulnerability
Citation
Lecture Notes in Electrical Engineering, v.373, pp.275 - 281
Journal Title
Lecture Notes in Electrical Engineering
Volume
373
Start Page
275
End Page
281
URI
http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/9703
DOI
10.1007/978-981-10-0281-6_40
ISSN
1876-1100
Abstract
As more people use IT products, the application extent of software has increased along with demand for it. In addition to commercialized software, open source software is also seeing its market grow rapidly. But open source software is developed by those without expert knowledge in security. As a result, many security vulnerabilities arise and are taken advantage of for attacks. Therefore, in this paper, we suggested the design of an exploitable automatic verification system for secure open source software to address these issues. It is expected that, through the use of this system, the reliabilities of the open source software, the developers of the open source software, and the corporations using can be improved. © Springer Science+Business Media Singapore 2015.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher PARK, JAE PYO photo

PARK, JAE PYO
Graduate School (Graduate School of Information Sciences)
Read more

Altmetrics

Total Views & Downloads

BROWSE