Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

Alexander Cobleigh, Martin Hell, Linus Karlsson, Oscar Reimer, Jonathan Sönnerup, Daniel Wisenhoff

Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceedingForskningPeer review

3 !!Citations (SciVal)
39 Nedladdningar (Pure)


We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are matched with vulnerability information from open resources. The results are visualized on several different levels, ranging from product portfolio and individual products, to specific releases and vulnerabilities. The tool keeps track of how security evolves over time in deployed releases, and also how the maintenance organization progresses in evaluating new vulnerabilities. This will result in more efficient, accurate, and robust security analysis and awareness within the organization, and the anticipated long term effect is more secure products.
Titel på gästpublikationIEEE 22nd International Enterprise Distributed Object Computing Workshop
FörlagIEEE - Institute of Electrical and Electronics Engineers Inc.
Antal sidor4
ISBN (elektroniskt)978-1-5386-4141-5
StatusPublished - 2018

Ämnesklassifikation (UKÄ)

  • Datorsystem


Utforska forskningsämnen för ”Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code”. Tillsammans bildar de ett unikt fingeravtryck.

Citera det här