Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters

Author(s):  
Adarsh Anand ◽  
Navneet Bhatt ◽  
Omar H. Alhazmi
Author(s):  
Adarsh Anand ◽  
Navneet Bhatt ◽  
Deepti Aggrawal

A software system deals with various security implications after its release in the market. Correspondingly, firm releases security patches to counter those flaws discovered in the software system. A vendor releases a patch only if a vulnerability has been discovered in a software. It is an important aspect that encompasses the prediction of potential number of patches to be released to maintain the stability of a software. Vulnerability Discovery Models (VDMs) help a software vendor to acknowledge the security trends, forecast security investments and to plan patches, but very few attempts have been made to model the Vulnerability Patch Modeling (VPM) based on the impact of vulnerabilities discovered over the time period. In this proposal, we deduce a novel approach that addresses trend in the sequential development of patches based on the vendor or reporters fetching out the vulnerabilities in a software. The vulnerability trends in a software significantly affect the discovery process and later trigger a patch deployment to suppress the possible likelihood of a breach. The integrative approach underlines the association of vulnerability patch modeling with the vulnerability discovery phenomenon. To exemplify the proposed systematic structure, a statistical analysis has been conducted using real life vulnerability and patch datasets.


2021 ◽  
Vol 336 ◽  
pp. 09020
Author(s):  
Yuan Qi ◽  
Ning Kang

In this paper, the economic benefits of prefabricated buildings which are not directly reflected in the economic returns of investors are called indirect economic benefits. Based on the literature mining of the indirect economic relationship of a large number of prefabricated buildings, this paper constructs an analysis framework of indirect environment and social and economic benefits. Through BIM modeling software, the three prefabricated building models are modified into traditional building models. The indirect economic benefits of the project are calculated by using the index system. The functional relationship between the indirect economic benefits of prefabricated buildings and the assembly rate is established by using the SSPS statistical data processing software, which more intuitively shows the law of the indirect economic benefits of prefabricated buildings with the assembly rate It shows the impact of prefabricated building on environment and society, which is of great significance for the harmony between prefabricated building and society and environment, and the healthy and sustainable development of construction industry.


2016 ◽  
Vol 21 (8) ◽  
pp. 769-785 ◽  
Author(s):  
Emma S. Hickman ◽  
Martine E. Lomax ◽  
Bent K. Jakobsen

Evidence of adaptive immune responses in the prevention of cancer has been accumulating for decades. Spontaneous T-cell responses occur in multiple indications, bringing the study of de novo expressed cancer antigens to the fore and highlighting their potential as targets for cancer immunotherapy. Circumventing the immune-suppressive mechanisms that maintain tumor tolerance and driving an antitumor cytotoxic T-cell response in cancer patients may eradicate the tumor or block disease progression. Multiple strategies are being pursued to harness the cytotoxic potential of T cells clinically. Highly promising results are now emerging. The focus of this review is the target discovery process for cancer immune therapeutics based on affinity-matured T-cell receptors (TCRs). Target cancer antigens in the context of adoptive cell transfer technologies and soluble biologic agents are discussed. To appreciate the impact of TCR-based technology and understand the TCR discovery process, it is necessary to understand key differences between TCR-based therapy and other immunotherapy approaches. The review first summarizes key advances in the cancer immunotherapy field and then discusses the opportunities that TCR technology provides. The nature and breadth of molecular targets that are tractable to this approach are discussed, together with the challenges associated with finding them.


2015 ◽  
Vol 91 (1) ◽  
pp. 317-346 ◽  
Author(s):  
Brady Twedt

ABSTRACT This study investigates the impact of dissemination on the efficiency of the price discovery process with respect to management earnings guidance disclosures. I first identify firm and guidance characteristics associated with the likelihood that guidance receives coverage in the Dow Jones Newswires. Using propensity score, within-firm, and returns-based matched control samples of guidance, I find that newswire dissemination is associated with larger initial price reactions and, more importantly, an increase in the speed with which guidance information is incorporated into price. I also find that newswire coverage affects the market's reaction to stand-alone versus bundled guidance and good versus bad news guidance. This study is the first to provide evidence of systematic variation, both across and within firms, in the breadth of guidance dissemination, and it shows that this variation has a substantial effect on how investors respond to guidance. JEL Classifications: G14; M41; L82.


Minerals ◽  
2020 ◽  
Vol 10 (12) ◽  
pp. 1111
Author(s):  
Francis J. Sousa ◽  
Kenneth A. Farley

This paper presents a framework for evaluating variation in (U-Th)/He datasets. The framework is objective, repeatable, and based on compatibility of thermal histories derived from individual (U-Th)/He dates. The structure of this new method includes three fundamental steps. First, the allowable thermal history of each individual grain is quantitatively constrained with a model. Second, the thermal histories of all grains from a sample are visualized on the same axes. Third, the compatibility of the allowable thermal histories of each individual grain is evaluated. This allows a user to assess whether variation among single grain dates can plausibly be explained (referred to here as legitimate) or not (illegitimate). Additionally, this methodology allows for accurate representation of the impact that illegitimate variation has on the thermal history constraints of a sample. We demonstrate the application of this new framework using a variety of examples from the literature, as well as with synthetic data. Modeling presented here is executed using the modeling software QTQt (version 5.6.0) and the He diffusion kinetics based on the radiation damage accumulation and annealing model, but the framework is designed to be easily adaptable to any modeling software and diffusion parameters.


2019 ◽  
Vol 37 (6/7) ◽  
pp. 1113-1124 ◽  
Author(s):  
Navneet Bhatt ◽  
Adarsh Anand ◽  
Deepti Aggrawal

Purpose The purpose of this paper is to provide a mathematical framework to optimally allocate resources required for the discovery of vulnerabilities pertaining to different severity risk levels. Design/methodology/approach Different sets of optimization problems have been formulated and using the concept of dynamic programming approach, sequence of recursive functions has been constructed for the optimal allocation of resources used for discovering vulnerabilities of different severity scores. Mozilla Thunderbird web browser data set has been considered for giving the empirical evaluation by working with vulnerabilities of different severities. Findings As per the impact associated with a vulnerability, critical and high severity level are required to be patched promptly, and hence, a larger amount of funds have to be allocated for vulnerability discovery. Nevertheless, a low or medium risk vulnerability might also get exploited and thereby their discovery is also crucial for higher severity vulnerabilities. The current framework provides a diversified allocation of funds as per the requirement of a software manager and also aims at improving the discovery of vulnerability significantly. Practical implications The finding of this research may enable software managers to adequately assign resources in managing the discovery of vulnerabilities. It may also help in acknowledging the funds required for various bug bounty programs to cater security reporters based on the potential number of vulnerabilities present in software. Originality/value Much of the attention has been focused on the vulnerability discovery modeling and the risk associated with the security flaws. But, as far as the authors’ knowledge is concern, there is no such study that incorporates optimal allocation of resources with respect to the vulnerabilities of different severity scores. Hence, the building block of this paper contributes to future research.


Sign in / Sign up

Export Citation Format

Share Document