Abstract:Despite the large amount of effort that goes toward finding and patching security holes, the available data does not show a clear improvement in software quality as a result. This article aims to meas...Despite the large amount of effort that goes toward finding and patching security holes, the available data does not show a clear improvement in software quality as a result. This article aims to measure the effect of vulnerability finding. Any attempt to measure this kind of effect is inherently rough, depending as it does on imperfect data and several simplifying assumptions. Because I'm looking for evidence of usefulness, where possible, I bias such assumptions in favor of a positive result - explicitly calling out those assumptions biased in the opposite direction. Thus, the analysis in this article represents the best-case scenario, consistent with the data and my ability to analyze it, for the vulnerability finding's usefulnessRead More
Publication Year: 2005
Publication Date: 2005-01-01
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 268
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot