Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats

05/16/2022
by   Giorgio Di Tizio, et al.
0

Software updates reduce the opportunity for exploitation. However, since updates can also introduce breaking changes, enterprises face the problem of balancing the need to secure software with updates with the need to support operations. We propose a methodology to quantitatively investigate the effectiveness of software updates strategies against attacks of Advanced Persistent Threats (APTs). We consider strategies where the vendor updates are the only limiting factors to cases in which enterprises delay updates from 1 to 7 months based on SANS data. Our manually curated dataset of APT attacks covers 86 APTs and 350 campaigns from 2008 to 2020. It includes information about attack vectors, exploited vulnerabilities (e.g. 0-days vs public vulnerabilities), and affected software and versions. Contrary to common belief, most APT campaigns employed publicly known vulnerabilities. If an enterprise could theoretically update as soon as an update is released, it would face lower odds of being compromised than those waiting one (4.9x) or three (9.1x) months. However, if attacked, it could still be compromised from 14 before applying an update, our major finding is that one could perform 12 all possible updates restricting oneself only to versions fixing publicly known vulnerabilities without significant changes to the odds of being compromised compared to a company that updates for all versions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/12/2023

Are Software Updates Useless Against Advanced Persistent Threats?

A dilemma worth Shakespeare's Hamlet is increasingly haunting companies ...
research
08/30/2022

Software Update Practices on Smart Home IoT Devices

Smart home IoT devices are known to be breeding grounds for security and...
research
07/15/2020

Data Sampling on MDS-resistant 10th Generation Intel Core (Ice Lake)

Microarchitectural Data Sampling (MDS) is a set of hardware vulnerabilit...
research
12/01/2016

When to Reset Your Keys: Optimal Timing of Security Updates via Learning

Cybersecurity is increasingly threatened by advanced and persistent atta...
research
05/29/2023

Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations

Chatbots shifted from rule-based to artificial intelligence techniques a...
research
05/11/2018

Quantifying Users' Beliefs about Software Updates

Software updates are critical to the performance, compatibility, and sec...
research
07/05/2023

ScalOTA: Scalable Secure Over-the-Air Software Updates for Vehicles

Over-the-Air (OTA) software updates are becoming essential for electric/...

Please sign up or login with your details

Forgot password? Click here to reset