Next Article in Journal
Impacts of Industrial Heterogeneity and Technical Innovation on the Relationship between Environmental Performance and Financial Performance
Next Article in Special Issue
Context-Aware Multimodal FIDO Authenticator for Sustainable IT Services
Previous Article in Journal
Examining Vulnerability Factors to Natural Disasters with a Spatial Autoregressive Model: The Case of South Korea
Previous Article in Special Issue
Signal Outages of CSMA/CA-Based Wireless Networks with Different AP Densities
Article

An Automated Vulnerability Detection and Remediation Method for Software Security

Korea Internet & Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do 58324, Korea
*
Author to whom correspondence should be addressed.
Sustainability 2018, 10(5), 1652; https://doi.org/10.3390/su10051652
Received: 6 April 2018 / Revised: 7 May 2018 / Accepted: 16 May 2018 / Published: 21 May 2018
(This article belongs to the Collection Advanced IT based Future Sustainable Computing)
As hacking techniques become more sophisticated, vulnerabilities have been gradually increasing. Between 2010 and 2015, around 80,000 vulnerabilities were newly registered in the CVE (Common Vulnerability Enumeration), and the number of vulnerabilities has continued to rise. While the number of vulnerabilities is increasing rapidly, the response to them relies on manual analysis, resulting in a slow response speed. It is necessary to develop techniques that can detect and patch vulnerabilities automatically. This paper introduces a trend of techniques and tools related to automated vulnerability detection and remediation. We propose an automated vulnerability detection method based on binary complexity analysis to prevent a zero-day attack. We also introduce an automatic patch generation method through PLT/GOT table modification to respond to zero-day vulnerabilities. View Full-Text
Keywords: security; vulnerability; automation; fuzzing; symbolic execution security; vulnerability; automation; fuzzing; symbolic execution
Show Figures

Figure 1

MDPI and ACS Style

Jurn, J.; Kim, T.; Kim, H. An Automated Vulnerability Detection and Remediation Method for Software Security. Sustainability 2018, 10, 1652. https://doi.org/10.3390/su10051652

AMA Style

Jurn J, Kim T, Kim H. An Automated Vulnerability Detection and Remediation Method for Software Security. Sustainability. 2018; 10(5):1652. https://doi.org/10.3390/su10051652

Chicago/Turabian Style

Jurn, Jeesoo, Taeeun Kim, and Hwankuk Kim. 2018. "An Automated Vulnerability Detection and Remediation Method for Software Security" Sustainability 10, no. 5: 1652. https://doi.org/10.3390/su10051652

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop