Метод использования данных киберразведки для поддержки принятия решений при управлении уязвимостями программного обеспечения
Аннотация
Ключевые слова
Полный текст:
PDFЛитература
A distributed vulnerability database for Open Source [Electronic resource]. 2026 https://osv.dev (accessed 04/11/2026).
Ben Othmane L., Chehrazi G., et al. Time for addressing software security issues: prediction models and impacting factors // Data Sci. Eng. 2, 107–124 (2017). 10.1007/s41019-016-0019-8. GCAVFS.
Bonan Ruan Zhiwei Lin Jiahao Liu Chuqi Zhang Kaihang Ji Zhenkai Liang. “Propagation-Based Vulnerability Impact Assessment for Software Supply Chains” 09.10.2025. arxiv.org/pdf/2506.01342.
Dann A., Plate H., et al. (2022). Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite // IEEE Trans. Software Eng. 48. 3613-3625. 10.1109/TSE.2021.3101739.
GitHub Advanced Security Database [Electronic resource]. 2026. https://docs.github.com/ru/get-started/learning-about-github/about-github-advanced-security (accessed 04/11/2026).
Imranur Rahman, Jill Marley, William Enck, Laurie Williams. ”Which Is Better For Reducing Outdated and Vulnerable Dependencies: Pinning or Floating?” 23.10.25. arxiv.org/html/2510.08609v2.
Imtiaz N., Thorn S., Williams L. (2021). A comparative study of vulnerability reporting by software composition analysis tools // ESEM'21: ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. 1-11. 10.1145/3475716.3475769.
National Vulnerability Database [Electronic resource]. 2026. https://nvd.nist.gov (accessed 04/11/2026).
npm-audit [Electronic resource]. 2026. https://docs.npmjs.com/cli/v9/commands/npm-audit (accessed 04/11/2026).
Papotti A., Tuma K., Massacci F. (2025). On the effects of program slicing for vulnerability detection during code inspection // Empirical Software Engineering. 30. 10.1007/s10664-025-10636-y.
Paramitha R., Massacci F. (2023). Technical leverage analysis in the Python ecosystem // Empirical Software Engineering. 28. 10.1007/s10664-023-10355-2.
Prutzkow A. V. “What is a good program? A space way” // SIIT. 2026. Vol. 8, no. 2(26), pp. 29 37. HGXVAJ.
Snyk Security Database [Electronic resource]. 2026. https://security.snyk.io (accessed 04/11/2026).
Zhang M., de Carné de Carnavalet X, et al. (2019). Large-scale empirical study of important features indicative of discovered vulnerabilities to assess application security // IEEE Transactions on Information Forensics and Security. 10.1109/TIFS.2019.2895963.
Надеев С. А. Автоматизированный инструмент для рефакторинга логов в программном обеспечении // СИИТ. 2024. Т. 6, № 2(17). С. 72-77. OWVACS. [[Nadeev S. A. Automated tool for refactoring logs in software // SIIT. 2024. Vol. 6, No. 2(17). P. 72-77. (In Russian).]]
Орлов Г. О. Подход к обеспечению безопасности программного кода в веб-ориентированной среде // СИИТ. 2023. Т. 5, № 5(14). С. 68-77. HPCIMR. [[Orlov G. O. Approach to ensuring the security of software code in a web-oriented environment // SIIT. 2023. Vol. 5, No. 5(14). P. 68-77. (In Russian).]]
Сударев А. Уязвимости открытого исходного кода удваиваются по мере роста Ai [Элекр. ресурс]. 06.03.2026. https://itshaman.ru/news/security/uyazvimosti-otkrytogo-iskhodnogo-koda-udvaivayutsya-po-mere-rosta-kodirovaniya-ii. [[Sudarev A. Open Source Vulnerabilities Double as AI Grows. 03/06/2026. (In Russian).]]
DOI: https://doi.org/10.54708/SIIT-2026-no3-p80
Ссылки
- На текущий момент ссылки отсутствуют.
(c) 2026 Р. Р. Сабитов, К. В. Миронов




