Assessing Vulnerabilities in Software and Hardware Systems

Authors

  • Hamid Borkot Tulla Computer Science and Technology, Nantong University, China
  • Naimur Rhaman Computer Science and Technology, Nantong University, China
  • Mahmud Midul Computer Science and Technology, Nantong University, China
  • Rabius Sany Computer Science and Technology, Nantong University, China

DOI:

https://doi.org/10.61424/jcsit.v1i1.191

Keywords:

Software Security, Hardware Security, Penetration Testing, Vulnerability Scanning, AI Security

Abstract

Understanding vulnerabilities in software and hardware is crucial for effective cybersecurity. A vulnerability allows attackers to breach system confidentiality, integrity, or availability. This research introduces a novel machine learning framework aimed at enhancing vulnerability detection accuracy while reducing false positive rates. We discuss principles of vulnerability assessment methodologies, particularly for products combining software and hardware. The study reviews various exploitation methods, including cyber-physical and side-channel attacks, outlining their locations and potential impacts. We present case studies on software vulnerabilities using multiple detection tools and explore the influence of emerging technologies, such as quantum computing, on detection methods. Our findings emphasize the need for proactive measures in risk management and highlight five security priorities that organizations should adopt. Further research is essential to address unlisted software vulnerabilities and improve detection methodologies.

Downloads

Published

2025-02-06 — Updated on 2025-02-10

Versions

How to Cite

Tulla, H. B., Rhaman, N., Midul, M., & Sany, R. (2025). Assessing Vulnerabilities in Software and Hardware Systems. Journal of Computer Science and Information Technology, 1(1), 50–63. https://doi.org/10.61424/jcsit.v1i1.191 (Original work published February 6, 2025)