A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk
Current Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System architects create system blueprints and draw specifications for the software artefacts that are needed; subsequently, either custom-made software i...
Saved in:
Published in | Electronics (Basel) Vol. 12; no. 10; p. 2278 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
18.05.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Current Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System architects create system blueprints and draw specifications for the software artefacts that are needed; subsequently, either custom-made software is developed according to these specifications and/or ready-made COTS/open source software may be identified and customized to realize the overall system goals. All deployed software however may entail vulnerabilities, either due to insecure coding practices or owing to misconfigurations and unexpected interactions. Moreover, software artefacts may implement a much broader set of functionalities than may be strictly necessary for the system at hand, in order to serve a wider range of needs, and failure to appropriately configure the deployed software to include only the required modules results in the further increase of the system attack surface and the associated risk. In this paper, we present a software vulnerability management framework which facilitates (a) the configuration of software to include only the necessary features, (b) the execution of security-related tests and the compilation of platform-wide software vulnerability lists, and (c) the prioritization of vulnerability addressing, considering the impact of each vulnerability, the associated technical debt for its remediation, and the available security budget. The proposed framework can be used as an aid in IoT platform implementation by software architects, developers, and security experts. |
---|---|
AbstractList | Current Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System architects create system blueprints and draw specifications for the software artefacts that are needed; subsequently, either custom-made software is developed according to these specifications and/or ready-made COTS/open source software may be identified and customized to realize the overall system goals. All deployed software however may entail vulnerabilities, either due to insecure coding practices or owing to misconfigurations and unexpected interactions. Moreover, software artefacts may implement a much broader set of functionalities than may be strictly necessary for the system at hand, in order to serve a wider range of needs, and failure to appropriately configure the deployed software to include only the required modules results in the further increase of the system attack surface and the associated risk. In this paper, we present a software vulnerability management framework which facilitates (a) the configuration of software to include only the necessary features, (b) the execution of security-related tests and the compilation of platform-wide software vulnerability lists, and (c) the prioritization of vulnerability addressing, considering the impact of each vulnerability, the associated technical debt for its remediation, and the available security budget. The proposed framework can be used as an aid in IoT platform implementation by software architects, developers, and security experts. |
Audience | Academic |
Author | Mathas, Christos-Minas Sotiropoulos, Panagiotis Vassilakis, Costas Kolokotronis, Nicholas |
Author_xml | – sequence: 1 givenname: Panagiotis orcidid: 0000-0001-9669-7401 surname: Sotiropoulos fullname: Sotiropoulos, Panagiotis – sequence: 2 givenname: Christos-Minas orcidid: 0000-0002-4761-5833 surname: Mathas fullname: Mathas, Christos-Minas – sequence: 3 givenname: Costas orcidid: 0000-0001-9940-1821 surname: Vassilakis fullname: Vassilakis, Costas – sequence: 4 givenname: Nicholas orcidid: 0000-0003-0660-8431 surname: Kolokotronis fullname: Kolokotronis, Nicholas |
BookMark | eNptUctOYzEMjRAjAZ1-AZtIrMvkwW2SZYV4SUVIlJntlZs4EHpvAkkq1Pn6yagsWGAvbFnn-Mg-J-QwpoiEnHJ2LqVhv3BAW3OKwRYuOBNC6QNyLJgyMyOMOPzSH5FpKa-sheFSS3ZM3IKukq8fkJH-2Q4RM6zDEOqO3kOEZxwxVnqdYcSPlDfUp0zrC9L7EMMY_kINKdLk6WpXKo50USvYDV1tsweLFKKjj6FsfpIfHoaC0886Ib-vr54ub2fLh5u7y8VyZuWc15kDy3jHpeg0cu-c0tpo5r1aS5h7JqVydu7RqDnTxjAHa8dlpxQwqQUDKyfkbL_3Laf3LZbav6Ztjk2yF5qbC9m1oxvqfI96hgH7EH2qGWxLh2Ow7bc-tPlCdazpS2MaQe4JNqdSMvr-LYcR8q7nrP9vQf-NBfIf5s5-mw |
CitedBy_id | crossref_primary_10_25299_itjrd_2023_13251 |
Cites_doi | 10.1016/j.cose.2021.102494 10.3390/fi14100276 10.1109/MIE.2020.3008136 10.1145/3236024.3236068 10.1145/2971482 10.1109/COMST.2018.2869360 10.1109/IECON.2017.8217070 10.3390/en14102818 10.5220/0007950904990507 10.1109/MIC.2012.29 10.1016/j.procs.2020.04.217 10.1002/cpe.583 10.1016/j.iot.2019.100129 10.1109/TrustCom/BigDataSE.2019.00076 10.1145/3319535.3354206 10.1287/opre.50.1.42.17798 10.3390/s22041335 10.1109/EPEC.2015.7379940 10.1109/CCWC54503.2022.9720884 10.1109/SoutheastCon42311.2019.9020329 10.1109/EDOC49727.2020.00026 10.1007/978-3-642-37521-7 10.1109/JIOT.2022.3152364 10.23919/MIPRO.2017.7973622 10.1504/IJWET.2022.127876 10.1109/ISI.2016.7745438 10.1016/j.comnet.2018.11.025 10.3390/s21072329 10.1016/j.cosrev.2022.100467 10.3390/electronics8111218 10.1145/3533767.3534414 10.1109/ETFA.2012.6489544 10.1109/ISCC47284.2019.8969728 10.1109/TSMC.2019.2915940 10.1145/3407023.3409185 10.1007/978-1-4842-4294-0 10.14722/ndss.2019.23488 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 7SP 8FD 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO HCIFZ L7M P5Z P62 PIMPY PQEST PQQKQ PQUKI PRINS |
DOI | 10.3390/electronics12102278 |
DatabaseName | CrossRef Electronics & Communications Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Database (1962 - current) ProQuest Central Essentials AUTh Library subscriptions: ProQuest Central Technology Collection ProQuest One Community College ProQuest Central SciTech Premium Collection (Proquest) (PQ_SDU_P3) Advanced Technologies Database with Aerospace ProQuest Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Access via ProQuest (Open Access) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China |
DatabaseTitle | CrossRef Publicly Available Content Database Advanced Technologies & Aerospace Collection Technology Collection Technology Research Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest One Academic Advanced Technologies Database with Aerospace |
DatabaseTitleList | CrossRef Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Architecture |
EISSN | 2079-9292 |
ExternalDocumentID | A750889399 10_3390_electronics12102278 |
GeographicLocations | Greece |
GeographicLocations_xml | – name: Greece |
GroupedDBID | 5VS 8FE 8FG AAYXX AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS BENPR BGLVJ CCPQU CITATION GROUPED_DOAJ HCIFZ IAO ITC KQ8 MODMG M~E OK1 P62 PIMPY PROAC 7SP 8FD ABUWG AZQEC DWQXO L7M PQEST PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c361t-dac01513258e1fdd788980ff7b3a6f0337dc6fe97608990dabd13577a03820ac3 |
IEDL.DBID | 8FG |
ISSN | 2079-9292 |
IngestDate | Thu Oct 10 16:49:35 EDT 2024 Tue Jan 23 06:12:50 EST 2024 Fri Aug 23 02:37:03 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c361t-dac01513258e1fdd788980ff7b3a6f0337dc6fe97608990dabd13577a03820ac3 |
ORCID | 0000-0002-4761-5833 0000-0003-0660-8431 0000-0001-9669-7401 0000-0001-9940-1821 |
OpenAccessLink | https://www.proquest.com/docview/2819435383?pq-origsite=%requestingapplication% |
PQID | 2819435383 |
PQPubID | 2032404 |
ParticipantIDs | proquest_journals_2819435383 gale_infotracacademiconefile_A750889399 crossref_primary_10_3390_electronics12102278 |
PublicationCentury | 2000 |
PublicationDate | 2023-05-18 |
PublicationDateYYYYMMDD | 2023-05-18 |
PublicationDate_xml | – month: 05 year: 2023 text: 2023-05-18 day: 18 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Electronics (Basel) |
PublicationYear | 2023 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | ref_50 ref_14 ref_13 ref_12 Prehofer (ref_37) 2001; 13 ref_55 ref_54 ref_53 ref_51 ref_19 ref_17 He (ref_33) 2022; 9 ref_16 ref_15 Schiller (ref_23) 2022; 44 Hussain (ref_5) 2019; 21 Kaur (ref_20) 2020; 171 ref_25 ref_24 ref_22 ref_21 ref_29 ref_28 ref_27 ref_26 HaddadPajouh (ref_10) 2021; 14 Grau (ref_2) 2021; 15 Omolara (ref_11) 2022; 112 Coppola (ref_4) 2016; 49 ref_36 ref_35 ref_34 Bormann (ref_45) 2012; 16 ref_32 ref_31 ref_30 Sotiropoulos (ref_18) 2022; 17 ref_39 ref_38 Dantzig (ref_40) 2002; 50 ref_47 Hassan (ref_8) 2019; 148 ref_46 Ghazo (ref_52) 2020; 50 ref_44 ref_43 ref_42 ref_41 ref_1 ref_3 ref_49 ref_48 ref_9 ref_7 ref_6 |
References_xml | – volume: 112 start-page: 102494 year: 2022 ident: ref_11 article-title: The internet of things security: A survey encompassing unexplored areas and new insights publication-title: Comput. Secur. doi: 10.1016/j.cose.2021.102494 contributor: fullname: Omolara – ident: ref_9 – ident: ref_35 doi: 10.3390/fi14100276 – ident: ref_26 – ident: ref_16 – volume: 15 start-page: 50 year: 2021 ident: ref_2 article-title: Robots in Industry: The Past, Present, and Future of a Growing Collaboration With Humans publication-title: IEEE Ind. Electron. Mag. doi: 10.1109/MIE.2020.3008136 contributor: fullname: Grau – ident: ref_55 doi: 10.1145/3236024.3236068 – volume: 49 start-page: 1 year: 2016 ident: ref_4 article-title: Connected Car publication-title: ACM Comput. Surv. doi: 10.1145/2971482 contributor: fullname: Coppola – volume: 21 start-page: 1275 year: 2019 ident: ref_5 article-title: Autonomous Cars: Research Results, Issues, and Future Challenges publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2018.2869360 contributor: fullname: Hussain – ident: ref_42 – ident: ref_1 doi: 10.1109/IECON.2017.8217070 – ident: ref_22 doi: 10.3390/en14102818 – ident: ref_27 – ident: ref_49 doi: 10.5220/0007950904990507 – volume: 16 start-page: 62 year: 2012 ident: ref_45 article-title: CoAP: An Application Protocol for Billions of Tiny Internet Nodes publication-title: IEEE Internet Comput. doi: 10.1109/MIC.2012.29 contributor: fullname: Bormann – ident: ref_48 – volume: 171 start-page: 2023 year: 2020 ident: ref_20 article-title: A Comparative Study of Static Code Analysis tools for Vulnerability Detection in C/C++ and JAVA Source Code publication-title: Procedia Computer Science doi: 10.1016/j.procs.2020.04.217 contributor: fullname: Kaur – ident: ref_41 – volume: 13 start-page: 465 year: 2001 ident: ref_37 article-title: Feature-oriented programming: A new way of object composition publication-title: Concurr. Comput. Pract. Exp. doi: 10.1002/cpe.583 contributor: fullname: Prehofer – ident: ref_38 – ident: ref_17 – volume: 14 start-page: 100129 year: 2021 ident: ref_10 article-title: A survey on internet of things security: Requirements, challenges, and solutions publication-title: Internet Things doi: 10.1016/j.iot.2019.100129 contributor: fullname: HaddadPajouh – ident: ref_29 doi: 10.1109/TrustCom/BigDataSE.2019.00076 – ident: ref_51 doi: 10.1145/3319535.3354206 – ident: ref_7 – ident: ref_28 – volume: 50 start-page: 42 year: 2002 ident: ref_40 article-title: Linear Programming publication-title: Oper. Res. doi: 10.1287/opre.50.1.42.17798 contributor: fullname: Dantzig – ident: ref_34 doi: 10.3390/s22041335 – ident: ref_47 – ident: ref_3 doi: 10.1109/EPEC.2015.7379940 – ident: ref_24 doi: 10.1109/CCWC54503.2022.9720884 – ident: ref_32 doi: 10.1109/SoutheastCon42311.2019.9020329 – ident: ref_54 doi: 10.1109/EDOC49727.2020.00026 – ident: ref_44 – ident: ref_21 – ident: ref_39 doi: 10.1007/978-3-642-37521-7 – volume: 9 start-page: 16438 year: 2022 ident: ref_33 article-title: Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3152364 contributor: fullname: He – ident: ref_31 doi: 10.23919/MIPRO.2017.7973622 – ident: ref_6 – volume: 17 start-page: 296 year: 2022 ident: ref_18 article-title: The additional testsuite framework: Facilitating software testing and test management publication-title: Int. J. Web Eng. Technol. doi: 10.1504/IJWET.2022.127876 contributor: fullname: Sotiropoulos – ident: ref_30 doi: 10.1109/ISI.2016.7745438 – volume: 148 start-page: 283 year: 2019 ident: ref_8 article-title: Current research on Internet of Things (IoT) security: A survey publication-title: Comput. Netw. doi: 10.1016/j.comnet.2018.11.025 contributor: fullname: Hassan – ident: ref_19 doi: 10.3390/s21072329 – volume: 44 start-page: 100467 year: 2022 ident: ref_23 article-title: Landscape of IoT security publication-title: Comput. Sci. Rev. doi: 10.1016/j.cosrev.2022.100467 contributor: fullname: Schiller – ident: ref_12 – ident: ref_25 doi: 10.3390/electronics8111218 – ident: ref_15 – ident: ref_36 doi: 10.1145/3533767.3534414 – ident: ref_46 doi: 10.1109/ETFA.2012.6489544 – ident: ref_14 doi: 10.1109/ISCC47284.2019.8969728 – volume: 50 start-page: 3488 year: 2020 ident: ref_52 article-title: A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks publication-title: IEEE Trans. Syst. Man Cybern. Syst. doi: 10.1109/TSMC.2019.2915940 contributor: fullname: Ghazo – ident: ref_43 – ident: ref_50 doi: 10.1145/3407023.3409185 – ident: ref_53 doi: 10.1007/978-1-4842-4294-0 – ident: ref_13 doi: 10.14722/ndss.2019.23488 |
SSID | ssj0000913830 |
Score | 2.3025904 |
Snippet | Current Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System... |
SourceID | proquest gale crossref |
SourceType | Aggregation Database |
StartPage | 2278 |
SubjectTerms | Architecture Cybersecurity Data security Integer programming Internet of Things Java Linux Methods Open source software Operating systems Public domain Software engineering Software reliability Specifications Taxonomy User requirements |
Title | A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk |
URI | https://www.proquest.com/docview/2819435383 |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB60vaggWhWrVfYgeDGY7aZ5nCRKaxFapLXiLWx2N1DUVJsU8eJvdyZNbQ_FY9hDYGZ35pvXNwAXkmCtcn1Ly1hbjiuVFdtuYHGlfEdoEZgmTSP3-m535Dy8tF7KhFtWtlUubGJhqPVEUY78mgo-6NoxoLr5-LRoaxRVV8sVGptQ5U3Po5Yuv3P_l2Mhzktf2HOyIYHR_fVyt0xWMGc1ab3aikNab5YLX9PZg90SJLJwrtV92DBpDXbClZx_DbZXmAQPQIdsiAb1S04Ne569EZV00fX6zZb9LayzaMRiiFQZIj_WG6fj93ISk00SNucvZ2GeS_XKhrNpIpVhMtVsMM5eD2HUaT_dda1ygYKlhMtzlL9Cb4_xZss3PNEaw93At5PEi4V0E1sITys3MYhIqPhnk7q4aHmetAUCA6nEEVTSSWqOgXHfVg6PPTeJtSMNDyRiNRm0JIqRPFodrhZSjD7mPBkRxhck9GiN0OtwSZKO6BXlU6lkOQyAPyM-qij0CDgGiJ7q0FgoIyqfVxYtL8PJ_8ensEX74ancz_0GVPLpzJwhisjj8-KqnEP1tt1_HOBX76f9C2LtzAs |
link.rule.ids | 315,783,787,12778,21401,27937,27938,33386,33757,43613,43818,74370,74637 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB60PfgA8Yn1uQfBi8Gkm-Zxkigt9dEivugtbHY3UKqptiniv3cm3dgeiuccAjO7M9889vsAzgTBWukFlhKJslxPSCuxvdBypAxcrnio6_QaudP12q_uXa_RMw23sVmrLGNiEajVUFKP_JIGPpjasaC6-vyySDWKpqtGQmMZqkRVFVSget3sPj79dVmI9TLg9pRuiGN9fzlTlxkX3Fl1ElibS0mLA3ORbVqbsGFgIoumft2CJZ1tw3o01_XfhrU5LsEdUBF7xpD6LUaavU3eiUy62Hv9YbMNF9YqV7EYYlWG2I91-ln_w7zFZMOUTRnMWZTnQg7Y82SUCqmZyBR76o8Hu_Daar7ctC0joWBJ7jk5ekBivseKsxFoJ1UKC94wsNPUT7jwUptzX0kv1YhJaPxnk8Mc3vB9YXOEBkLyPahkw0zvA3MCW7pO4ntpolyhnVAgWhNhQ6AZKafV4KK0Yvw5ZcqIscIgo8cLjF6Dc7J0TPcoHwkpzHMA_BkxUsWRT9AxRPxUg6PSGbG5YON4dhwO_v98Civtl85D_HDbvT-EVVKLp-G_ExxBJR9N9DFiijw5MQfnF1NgzZE |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB60gqggPrFadQ-CF0OTbrpJThIfxWcRX3gLm31AUVNtU8R_70y7tT2I5xwCM7Mz3-x8-w3AgSRYq0TsaZlrLxRSebkvEi9QKg655olp0Gvk27a4eAqvXpovjv_Ud7TKcU4cJmrdVXRHXqeBD5Z2bKjq1tEi7s5axx-fHm2QokmrW6cxC3NRKDg2YnMn5-27-98bF1LAjLk_kh7i2OvXJ5tm-kMdrQYtW5sqT38n6WHlaa3AsoOMLB35eBVmTLEGS-nUBGANFqd0BddBp-wB0-uX7Bn2PHgjYekhB_abTdgurDWmZTHErQxxILvtFJ139y6TdS0bqZmztCylemUPg56VyjBZaHbf6b9uwFPr_PH0wnPrFDzFRVCiNxTWfuw-m7EJrNbY_Caxb22Ucymsz3mklbAG8QmNAn1yXsCbUSR9jjBBKr4JlaJbmC1gQeyrMMgjYXMdShMkEpGbTJoSzUj1rQpHYytmHyPVjAy7DTJ69ofRq3BIls7oTJU9qaR7GoA_I3WqLI0IRiaIpapQGzsjc4etn01CY_v_z_swjzGT3Vy2r3dggRbHEw8giGtQKXsDs4vwosz3XNz8AKy-0cU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Software+Vulnerability+Management+Framework+for+the+Minimization+of+System+Attack+Surface+and+Risk&rft.jtitle=Electronics+%28Basel%29&rft.au=Sotiropoulos%2C+Panagiotis&rft.au=Christos-Minas+Mathas&rft.au=Vassilakis%2C+Costas&rft.au=Kolokotronis%2C+Nicholas&rft.date=2023-05-18&rft.pub=MDPI+AG&rft.eissn=2079-9292&rft.volume=12&rft.issue=10&rft.spage=2278&rft_id=info:doi/10.3390%2Felectronics12102278&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2079-9292&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2079-9292&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2079-9292&client=summon |