software security economics theory in practice
play

Software Security Economics: Theory, in Practice An Exploratory - PowerPoint PPT Presentation

Software Security Economics: Theory, in Practice An Exploratory Analysis Stephan Neuhaus<neuhaust@tik.ee.ethz.ch> Bernhard Plattner <plattner@tik.ee.ethz.ch> Thursday, June 28, 12 Making the Best Use of Cybersecurity Economic


  1. Software Security Economics: Theory, in Practice An Exploratory Analysis Stephan Neuhaus<neuhaust@tik.ee.ethz.ch> Bernhard Plattner <plattner@tik.ee.ethz.ch> Thursday, June 28, 12

  2. “Making the Best Use of Cybersecurity Economic Models” • Investing in software security always has positive, but diminishing returns • Modeled by a “increasing convex function”, which is “any increasing twice continuously differentiable function” • Statement without any qualification Rachel Rue and Shari Lawrence Pfleeger. Making the best use of cybersecurity economic models . IEEE Security & Privacy, 7 :52–60, 2009. Thursday, June 28, 12

  3. Security ∆ S 2 ∆ S 1 ∆ S 2 < ∆ S 1 Cumulative Investment ∆ I Thursday, June 28, 12

  4. Security Functions • Increasing (Slope always positive): d f /d I > 0 • Diminishing returns (Later slopes smaller than earlier ones): d 2 f /d I 2 < 0 • Hang on, that’s not convexity, that’s concavity • Not just any old twice continuously differen- tiable function will do • Also, twice continuous differentiability not needed, twice differentiable suffices Thursday, June 28, 12

  5. What they say is not what they mean Thursday, June 28, 12

  6. Is what they actually true? mean Thursday, June 28, 12

  7. More Security Functions • Investment always yields positive returns? • Just throw money in the general direction of security and it will never get any worse? • That would mean that it is impossible to choose a wrong security mechanism • Security systems so badly implemented that no security system would have been better! (TSA) • Just a plausibility argument , what does the data say? Thursday, June 28, 12

  8. Consequences • Vulnerability fixing is security investment • Stretched over time • If same investment yields less improvement tomorrow than it does today, then vulnerability fix rates should go down fix rate = #vulns fixed × #fixers unit time Thursday, June 28, 12

  9. Data Sets • Mozilla (292 vulnerabilities) • Apache httpd (66 vulnerabilities) • Apache Tomcat (21 vulnerabilities) Thursday, June 28, 12

  10. Mozilla 417 Advisories 382 with bug ID 292 with CVS commit message Image source: Mozilla foundation Thursday, June 28, 12

  11. Apache httpd • Security information published through CVE • No helpful links to bug reports • Manual mapping of vulnerabilities to fixes • Leaving out CVEs we can’t assign • Out of 100 CVEs, 66 remain Image source: Apache foundation Thursday, June 28, 12

  12. Apache Tomcat • From 2008 on, reports have revision number of fixing checkin :-) • Before 2008, there is no link at all :-( • Out of the 89 CVEs, only 21 remain • Attribution absolutely certain Image source: Apache foundation Thursday, June 28, 12

  13. Vulnerability Fix Checkins (Mozilla) 15 10 Checkins 5 0 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Thursday, June 28, 12

  14. Moving Average • Acts as a low-pass filter , removing high- frequency jiggling • Smoothes out strong day-to-day variations • Leaves overall trend (if any) • Trend will appear with a lag • We chose window size 365 • Even in leap years Thursday, June 28, 12

  15. Average Vulnerability Fix Checkins (Combined) 1 Average Checkins per Day 0.3 Product 0.1 Mozilla Httpd 0.03 Tomcat 0.01 0.003 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Thursday, June 28, 12

  16. Average Vulnerability Fix Checkins (Combined) Move to different repository, 1 way fewer checkins, higher percentage Average Checkins per Day of backported vuln fixes 0.3 Product 0.1 Mozilla Httpd 0.03 Tomcat 0.01 0.003 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Thursday, June 28, 12

  17. Average Vulnerability Fix Checkins (Combined) 1 Average Checkins per Day 0.3 Product 0.1 Mozilla Httpd 0.03 Tomcat 0.01 0.003 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Thursday, June 28, 12

  18. Average Vulnerability Fix Checkins (Combined) 1 Average Checkins per Day 0.3 Product 0.1 Mozilla Httpd 0.03 Tomcat 0.01 0.003 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Thursday, June 28, 12

  19. Average Vulnerability Fix Checkins (Combined) 1 Average Checkins per Day 0.3 Product 0.1 Mozilla Httpd 0.03 Tomcat 0.01 0.003 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Thursday, June 28, 12

  20. Number of Committers (Combined) 30 Average Checkins per Day Product 10 Mozilla Httpd Tomcat 3 1 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Thursday, June 28, 12

  21. Why does the Standard Model not Fit? • Standard model is for static situation • Software development is dynamic, has phases • Next week is a feature freeze • In two months, writing that new feature • Supply of easy vulnerabilities has not run out • Why not? It’s superficially plausible that they should! Thursday, June 28, 12

  22. Reservoirs average length μ in average length μ out Development Bug fixing time Thursday, June 28, 12

  23. Reservoirs • There is a reservoir of vulnerabilities • Phases of average length μ in in which vulnerabilities are put into the reservoir (development) • Phases of average length μ out in which vulnerabilities are taken out of the reservoir (bug fixing) • These phases alternate • Not perfect, but more plausible than standard model! Thursday, June 28, 12

  24. Consequences • “The number of [vulnerabilities] V will be heavy tailed with P( V > x ) ∼ cx − ( α − 1) L ( x ), where c and α are constants and L a slowly varying function.” • Number of vulnerabilities unknown! Thursday, June 28, 12

  25. More Consequences • Assume that in any given 365-day period, a constant fraction of the available vulnerabilities will be fixed, it follows that the number of days with a given number of checkins will also be heavy tailed • #vulnerabilities fixed � #vulnerabilities present • Not a priori clear, but let’s see what follows! Thursday, June 28, 12

  26. ● 10 3 10 2 ● Product Httpd ● Days Mozilla Tomcat 10 1 ● ● 10 0 ● ● 0 0 0 1 1 1 2 2 2 3 3 4 5 5 6 7 8 9 10 11 13 15 Checkins per Day Thursday, June 28, 12

  27. Other Things in the Paper • Is software security an arms race, where attackers and defenders have to work very hard just to maintain the status quo? • Would lead to distribution between successive days with fixes obeying a power law • No (or, if yes, lost in noise of other activity) Neil Johnson, Spencer Carran, Joel Botner, Kyle Fontaine, Nathan Laxague, Philip Nuetzel, Jessica Turnley, and Brian Tivnan. Pattern in escalations in insurgent and terrorist activity . Science, 333 (6038):81–84, July 2011. Thursday, June 28, 12

  28. You Should not Believe Me! • Make your own experiments on my data! • Find bugs in my scripts! • ftp://ftp.tik.ee.ethz.ch/pub/publications/ WEIS2012/fixrates.tar.gz • (Don’t write this down, it’s in the paper) Thursday, June 28, 12

  29. Personal Remarks • Share your data and scripts! • Many thanks to reviewer who pointed out problems with my “power law” analysis • This work is not about surprises • A scientific paper is not a news story Thursday, June 28, 12

  30. Conclusion • Standard model not applicable for software development • Hence perhaps not so standard • Reservoir model makes predictions that actually fit the data • Hence perhaps a better model • Ultimately, phenomenon not understood Thursday, June 28, 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend