TY - GEN
T1 - Characteristic classification and correlation analysis of source-level vulnerabilities in the Linux kernel
AU - Ko, Kwangsun
AU - Jang, Insook
AU - Kang, Yong Hyeog
AU - Lee, Jinseok
AU - Eom, Young Ik
PY - 2005
Y1 - 2005
N2 - Although studies regarding the classification and analysis of source-level vulnerabilities in operating systems are not direct and practical solutions to the exploits with which computer systems are attacked, it is important that these studies supply the elementary technology for the development of effective security mechanisms. Linux systems are widely used on the Internet and in intra-net environments. However, researches regarding the fundamental vulnerabilities in the Linux kernel have not been satisfactorily conducted. In this paper, characteristic classification and correlation analysis of source-level vulnerabilities in the Linux kernel, open to the public and listed on the Security Focus site for the 6 years from 1999 to 2004, are presented. This study will enable Linux kernel maintenance groups to understand the wide array of vulnerabilities, to analyze the characteristics of the attack abusing vulnerabilities, and to prioritize their development effort according to the impact of these vulnerabilities on the Linux systems.
AB - Although studies regarding the classification and analysis of source-level vulnerabilities in operating systems are not direct and practical solutions to the exploits with which computer systems are attacked, it is important that these studies supply the elementary technology for the development of effective security mechanisms. Linux systems are widely used on the Internet and in intra-net environments. However, researches regarding the fundamental vulnerabilities in the Linux kernel have not been satisfactorily conducted. In this paper, characteristic classification and correlation analysis of source-level vulnerabilities in the Linux kernel, open to the public and listed on the Security Focus site for the 6 years from 1999 to 2004, are presented. This study will enable Linux kernel maintenance groups to understand the wide array of vulnerabilities, to analyze the characteristics of the attack abusing vulnerabilities, and to prioritize their development effort according to the impact of these vulnerabilities on the Linux systems.
UR - https://www.scopus.com/pages/publications/33646842012
U2 - 10.1007/11596981_172
DO - 10.1007/11596981_172
M3 - Conference contribution
AN - SCOPUS:33646842012
SN - 3540308199
SN - 9783540308195
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1149
EP - 1156
BT - Computational Intelligence and Security - International Conference, CIS 2005, Proceedings
T2 - International Conference on Computational Intelligence and Security, CIS 2005
Y2 - 15 December 2005 through 19 December 2005
ER -