Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Implementation debate  



1.1  Benefits  





1.2  Drawbacks  







2 Metrics and models  



2.1  Number of days between vulnerabilities  





2.2  Poisson process  





2.3  Morningstar model  





2.4  Coverity scan  







3 See also  





4 References  





5 External links  














Open-source software security






Español

 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Open-source software security is the measure of assurance or guarantee in the freedom from danger and risk inherent to an open-source software system.

Implementation debate

[edit]

Benefits

[edit]

Drawbacks

[edit]

Metrics and models

[edit]

There are a variety of models and metrics to measure the security of a system. These are a few methods that can be used to measure the security of software systems.

Number of days between vulnerabilities

[edit]

It is argued that a system is most vulnerable after a potential vulnerability is discovered, but before a patch is created. By measuring the number of days between the vulnerability and when the vulnerability is fixed, a basis can be determined on the security of the system. There are a few caveats to such an approach: not every vulnerability is equally bad, and fixing a lot of bugs quickly might not be better than only finding a few and taking a little bit longer to fix them, taking into account the operating system, or the effectiveness of the fix.[2]

Poisson process

[edit]

The Poisson process can be used to measure the rates at which different people find security flaws between open and closed source software. The process can be broken down by the number of volunteers Nv and paid reviewers Np. The rates at which volunteers find a flaw is measured by λv and the rate that paid reviewers find a flaw is measured by λp. The expected time that a volunteer group is expected to find a flaw is 1/(Nv λv) and the expected time that a paid group is expected to find a flaw is 1/(Np λp).[2]

Morningstar model

[edit]

By comparing a large variety of open source and closed source projects a star system could be used to analyze the security of the project similar to how Morningstar, Inc. rates mutual funds. With a large enough data set, statistics could be used to measure the overall effectiveness of one group over the other. An example of such as system is as follows:[6]

Coverity scan

[edit]

Coverity in collaboration with Stanford University has established a new baseline for open-source quality and security. The development is being completed through a contract with the Department of Homeland Security. They are utilizing innovations in automated defect detection to identify critical types of bugs found in software.[7] The level of quality and security is measured in rungs. Rungs do not have a definitive meaning, and can change as Coverity releases new tools. Rungs are based on the progress of fixing issues found by the Coverity Analysis results and the degree of collaboration with Coverity.[8] They start with Rung 0 and currently go up to Rung 2.

The project has been analyzed by Coverity's Scan infrastructure, but no representatives from the open-source software have come forward for the results.[8]

At rung 1, there is collaboration between Coverity and the development team. The software is analyzed with a subset of the scanning features to prevent the development team from being overwhelmed.[8]

There are 11 projects that have been analyzed and upgraded to the status of Rung 2 by reaching zero defects in the first year of the scan. These projects include: AMANDA, ntp, OpenPAM, OpenVPN, Overdose, Perl, PHP, Postfix, Python, Samba, and tcl.[8]

See also

[edit]

References

[edit]
  1. ^ Cowan, C. (January 2003). Software Security for Open-Source Systems. IEEE Security & Privacy, 38–45. Retrieved 5 May 2008, from IEEE Computer Society Digital Library.
  • ^ a b c Witten, B., Landwehr, C., & Caloyannides, M. (2001, September/October). Does Open Source Improve System Security? IEEE Software, 57–61. Retrieved 5 May 2008, from Computer Database.
  • ^ Hoepman, J.-H., & Jacobs, B. (2007). Increased Security Through Open Source. Communications of the ACM, 50 (1), 79–83. Retrieved 5 May 2008, from ACM Digital Library.
  • ^ Lawton, G. (March 2002). Open Source Security: Opportunity or Oxymoron? Computer, 18–21. Retrieved 5 May 2008, from IEEE Computer Society Digital Library.
  • ^ Hansen, M., Köhntopp, K., & Pfitzmann, A. (2002). The Open Source approach – opportunities and limitations with respect to security and privacy. Computers & Security, 21 (5), 461–471. Retrieved 5 May 2008, from Computer Database.
  • ^ Peterson, G. (6 May 2008). Stalking the right software security metric. Retrieved 18 May 2008, from Raindrop.
  • ^ Coverity. (n.d.). Accelerating Open Source Quality Archived 5 March 2016 at the Wayback Machine. Retrieved 18 May 2008, from Scan.Coverity.com
  • ^ a b c d Coverity. (n.d.). Scan Ladder FAQ Archived 6 March 2016 at the Wayback Machine. Retrieved 18 May 2008, from Scan.Coverity.com.
  • [edit]
    Retrieved from "https://en.wikipedia.org/w/index.php?title=Open-source_software_security&oldid=1199420820"

    Categories: 
    Computer security
    Open source
    Hidden categories: 
    Webarchive template wayback links
    Use dmy dates from June 2023
     



    This page was last edited on 27 January 2024, at 01:13 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki