NASA Logo

NTRS

NTRS - NASA Technical Reports Server

Back to Results
Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug ReportsNASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.
Document ID
20180000547
Acquisition Source
Goddard Space Flight Center
Document Type
Contractor Report (CR)
Authors
Goseva-Popstojanova, Katerina
(TASC, Inc. Chantilly, VA, United States)
Tyo, Jacob P.
(TASC, Inc. Chantilly, VA, United States)
Sizemore, Brian
(West Virginia Univ. Morgantown, WV, United States)
Date Acquired
January 17, 2018
Publication Date
January 1, 2017
Subject Category
Computer Systems
Computer Programming And Software
Report/Patent Number
NASA/CR-2017-219024
GSFC-E-DAA-TN44886
Funding Number(s)
CONTRACT_GRANT: NNG17SA26C
CONTRACT_GRANT: NNG12SA03C
Distribution Limits
Public
Copyright
Public Use Permitted.
Keywords
vulnerability
systems
security
No Preview Available