Vulnerability Centric Exploitation Attempts in Open Source Software Systems

Free registration required

Executive Summary

There's been a lot of debate by security practitioners about the impact of open source approaches on security. One of the key issues is that open source exposes the source code to examination by everyone, both the attackers and defenders, and reasonable people disagree about the ultimate impact of this situation. It's been argued that a system without source code is more secure because, since there is less information available for an attacker, hence it should be harder for an attacker to find the vulnerabilities.

  • Format: PDF
  • Size: 906.8 KB