Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

Alexander Cobleigh, Martin Hell, Linus Karlsson, Oscar Reimer, Jonathan Sönnerup, Daniel Wisenhoff

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingResearchpeer-review

3 Citations (SciVal)
45 Downloads (Pure)


We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated long term effect is more secure products.
Original languageEnglish
Title of host publicationIEEE 22nd International Enterprise Distributed Object Computing Workshop
PublisherIEEE - Institute of Electrical and Electronics Engineers Inc.
Number of pages4
ISBN (Electronic)978-1-5386-4141-5
Publication statusPublished - 2018

Subject classification (UKÄ)

  • Computer Systems


Dive into the research topics of 'Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code'. Together they form a unique fingerprint.

Cite this