11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The CERT/CC built on its vast collection <strong>of</strong> data to create a knowledgebase 31 that addresses <strong>the</strong><br />

challenges <strong>of</strong> how to structure, distribute, and maintain security incident and vulnerability information<br />

in a useful form. Work on <strong>the</strong> knowledgebase began in 1996 with funding from <strong>the</strong> Air<br />

Force Materiel Command, Rome Laboratory, to build a prototype. The resulting work captured<br />

<strong>the</strong> interest <strong>of</strong> additional sponsors, and <strong>the</strong> Air Force Information Warfare Center sent associates<br />

to <strong>the</strong> <strong>SEI</strong> to work with CERT/CC staff to gain expertise to take back to <strong>the</strong>ir organizations.<br />

After chronicling <strong>the</strong> same implementation flaws repeatedly for more than 15 years, <strong>the</strong> CERT experts<br />

began developing vulnerability discovery tools to help reduce <strong>the</strong> number <strong>of</strong> vulnerabilities<br />

in s<strong>of</strong>tware before it is deployed. Starting with ActiveX,<br />

<strong>the</strong>y developed <strong>the</strong> Dranzer tool and released it to vendors<br />

in 2006 and to <strong>the</strong> open source community in 2009.<br />

They also published a paper describing <strong>the</strong> history, motivations,<br />

and rationale for Dranzer, along with early results<br />

[Dormann 2008]. In 2010, <strong>the</strong>y released <strong>the</strong> Basic<br />

Fuzzing Framework (BFF) to help developers and testers<br />

apply effective black-box fuzz testing to <strong>the</strong>ir s<strong>of</strong>tware.<br />

Ano<strong>the</strong>r tool, Failure Observation Engine (FOE),<br />

performs on Windows systems <strong>the</strong> same functions as <strong>the</strong><br />

BFF. Additionally, CERT triage tools assist s<strong>of</strong>tware<br />

vendors and analysts in identifying <strong>the</strong> impact <strong>of</strong> defects<br />

discovered through techniques such as fuzz testing. The<br />

CERT/CC continues to develop and test tools on current<br />

s<strong>of</strong>tware. The goal is to provide vendors with userfriendly,<br />

efficient tools and techniques <strong>the</strong>y can incorporate<br />

into <strong>the</strong>ir development process and prevent vulnerabilities<br />

before release.<br />

The Consequence: Improved Vendor<br />

Practices, Well-Informed System<br />

Mangers<br />

Vendors’ practices have improved, resulting in <strong>the</strong> improved<br />

security <strong>of</strong> <strong>the</strong>ir products. With CERT/CC influence,<br />

vendors have not only improved <strong>the</strong>ir development<br />

practices, but <strong>the</strong>y also provide safer default configurations<br />

and free, broad distribution <strong>of</strong> security updates.<br />

Also, <strong>the</strong> use <strong>of</strong> vulnerability discovery tools is leading<br />

to fewer vulnerabilities in released s<strong>of</strong>tware. Several<br />

The View from O<strong>the</strong>rs<br />

(These comments are from users<br />

<strong>of</strong> CERT publications and<br />

knowledgebase; identities are<br />

protected.)<br />

Thanks for <strong>the</strong> heads up.....you<br />

people are <strong>the</strong> greatest...in particular,<br />

this last one sewed up a hole<br />

that was literally a breach in front<br />

lines for our team, so speak.<br />

– a system administrator<br />

Thank you for providing a wonderful<br />

mechanism for tracking and<br />

notification concerning system vulnerabilities.<br />

– a corporate webmaster<br />

We have seen several potential defects<br />

revealed using Dranzer. It is<br />

certainly a useful tool, well documented,<br />

and really easy for an engineer<br />

to use.<br />

– a technical staff member <strong>of</strong><br />

a large technology<br />

vendor<br />

s<strong>of</strong>tware vendors have told CERT staff privately that <strong>the</strong>y ei<strong>the</strong>r have or plan to incorporate Dranzer<br />

and/or BFF into <strong>the</strong>ir s<strong>of</strong>tware development practices; one company’s job description noted a<br />

preference for those with Dranzer experience.<br />

31 For a brief description, see http://www.cert.org/vulnerability-analysis/knowledgebase/index.cfm.<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 171<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!