On NVD Users’ Attitudes, Experiences, Hopes, and Hurdles
Abstract
1 Introduction
2 Background and Research Questions
2.1 The NVD
2.1.1 The CVE Program.
2.1.2 From the CVE Program to the NVD.
2.2 Related Work
2.2.1 Vulnerability Management and Databases.
2.2.2 NVD Critics and Improvement.
2.3 Research Questions
3 Preliminary Study—Interviews
3.1 Study Design
3.2 Participants
ID | Age | Gender | Education | Job title | IT work experience | Specialization | Employees |
---|---|---|---|---|---|---|---|
P1 | 34 | Male | PhD | Referent | 16 years | Threat Intelligence | 100–300 |
P2 | 54 | Male | Diploma | Senior Security Consultant | 20 years | Security Management | 50–100 (A) |
P3 | 24 | Male | IT Specialist | Security Engineer | 5 years | Application Security | 1,000–10,000 (B) |
P4 | 38 | Male | PhD | Professor, Information Security Governance | 15 years | Teaching and Research | 1,000–10,000 |
P5 | 33 | Diverse | PhD | Security Engineer | 9 years | Product Development | 1,000–10,000 (B) |
P6 | 46 | Male | M. Sc. | Principal | 27 years | IT Security Advisor | 300–1,000 |
P7 | 35 | Male | B. Sc. | IT Security Advisor | 4 years | Security Management | 50–100 (A) |
3.3 Results
3.3.1 NVD Usage.
3.3.2 Issues when Using the NVD.
“The quality [of NVD records] varies greatly depending on the team that fills it out. So there are teams that have incredibly good security experts, people with 20 years of experience [\(\ldots\)] and there are teams that write in the minimum that can be written, or the information is often wrong because it hasn’t been validated.”
3.3.3 Trust in the NVD.
“[The] NVD is the database par excellence for vulnerabilities. Everyone uses it and that wouldn’t be the case if the trust [\(\ldots\)] wasn’t there.”
3.3.4 Perceived Positive and Negative Aspects of the NVD.
Positive Aspects.
“In any case, the positive thing is that there is a broad overall view of vulnerabilities. Someone has to do it so that one knows what one’s talking about and that you have the information readily available. So that’s definitely really, really great.”
“Back then, vulnerabilities were exchanged by fax or as e-mails with poor text files. And now you have a public database where everything is transparent and where there is a process behind it that is accepted by everyone. So I think this is an extremely positive achievement that we have.”
Negative Aspects.
3.3.5 Sympathy with the NVD.
“But I can tell you one thing, what is being done behind the scenes, what money is needed for [the NVD], how many people are working on it, also working on it voluntarily. That is immense.”
3.3.6 Takeaways for Main Study.
4 Main Study—Survey
4.1 Study Design
4.1.1 Questionnaire and Testing.
4.1.2 Ethics.
4.1.3 Data Analysis.
4.1.4 Recruitment.
4.2 Participants and Demographics
\(N\) | \(\%\) | |
---|---|---|
Total | 71 | 100.0 |
Male | 52 | 73.2 |
Female | 2 | 2.8 |
Diverse | 2 | 2.8 |
N/A | 15 | 21.1 |
18–29 years | 4 | 5.6 |
30–39 years | 16 | 22.5 |
40–49 years | 21 | 29.6 |
Above 50 years | 11 | 15.5 |
N/A | 19 | 26.8 |
Germany | 34 | 47.9 |
Other European country | 10 | 14.1 |
USA | 11 | 15.5 |
Other country | 3 | 4.2 |
N/A | 13 | 18.3 |
No academic education | 5 | 7.0 |
Bachelor’s degree | 12 | 16.9 |
Master’s degree | 31 | 43.7 |
Ph.D. | 11 | 15.5 |
Other | 2 | 2.8 |
N/A | 10 | 14.1 |
1–5 years work experience | 17 | 23.9 |
6–10 years work experience | 19 | 26.8 |
11–20 years work experience | 21 | 29.6 |
More than 20 years work experience | 9 | 12.7 |
4.3 Results
4.3.1 NVD Usage.
4.3.2 Issues when Using the NVD.
4.3.3 Attitude Toward the NVD.
5 NVD Interviews
5.1 Study Design and Participants
5.2 Problems of the NVD
“[The NVD team is] at capacity for what humans can do within the work load and the expectations [\(\ldots\)] and it is not even close to what is really necessary to be able to keep up with new publications, the needs of CPE management or updates to existing records after initial analysis.”
5.3 Possible Solutions and Future Plans
6 Discussion
6.1 Usage of the NVD (RQ1)
6.2 Issues and Their Origin (RQ2)
6.3 Positive Attitude but Room for Improvement (RQ3, RQ4)
6.4 Limitations
7 Conclusion
Acknowledgements
Author Contribution Statement
Footnotes
References
Index Terms
- On NVD Users’ Attitudes, Experiences, Hopes, and Hurdles
Recommendations
Common Vulnerability Scoring System
Vendors have historically used proprietary methods for scoring software vulnerabilities, usually without detailing their criteria or processes. The Common Vulnerability Scoring System (CVSS) is a public initiative designed to address this issue by ...
Automated Generation of Attack Graphs Using NVD
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyToday's computer networks are prone to sophisticated multi-step, multi-host attacks. Common approaches of identifying vulnerabilities and analyzing the security of such networks with naive methods such as counting the number of vulnerabilities, or ...
SARA --- system for inventory and static security control in a grid infrastructure
Building a National Distributed e-Infrastructure - PL-GridIT security, even if once achieved, is not a permanent state but rather a process. One of the main factors that impact this process is the ability to identify security vulnerabilities in the software. Disclosing such a flaw is usually followed by ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- German Federal Ministry of Education and Research
- Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) as part of the Research and Training Group 2475 “Cybercrime and Forensic Computing”
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 495Total Downloads
- Downloads (Last 12 months)495
- Downloads (Last 6 weeks)111
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in