Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database

被引:39
|
作者
Rahimi, Sanaz [1 ]
Zargham, Mehdi [1 ]
机构
[1] So Illinois Univ, Dept Comp Sci, Carbondale, IL 62901 USA
关键词
Code security; static analysis; vulnerability discovery model; vulnerability prediction;
D O I
10.1109/TR.2013.2257052
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Predicting software vulnerability discovery trends can help improve secure deployment of software applications and facilitate backup provisioning, disaster recovery, diversity planning, and maintenance scheduling. Vulnerability discovery models (VDMs) have been studied in the literature as a means to capture the underlying stochastic process. Based on the VDMs, a few vulnerability prediction schemes have been proposed. Unfortunately, all these schemes suffer from the same weaknesses: they require a large amount of historical vulnerability data from a database (hence they are not applicable to a newly released software application), their precision depends on the amount of training data, and they have significant amount of error in their estimates. In this work, we propose vulnerability scrying, a new paradigm for vulnerability discovery prediction based on code properties. Using compiler-based static analysis of a codebase, we extract code properties such as code complexity (cyclomatic complexity), and more importantly code quality (compliance with secure coding rules), from the source code of a software application. Then we propose a stochastic model which uses code properties as its parameters to predict vulnerability discovery. We have studied the impact of code properties on the vulnerability discovery trends by performing static analysis on the source code of four real-world software applications. We have used our scheme to predict vulnerability discovery in three other software applications. The results show that even though we use no historical data in our prediction, vulnerability scrying can predict vulnerability discovery with better precision and less divergence over time.
引用
收藏
页码:395 / 407
页数:13
相关论文
共 50 条
  • [1] A Software Vulnerability Rating Approach Based on the Vulnerability Database
    Luo, Jian
    Lo, Kueiming
    Qu, Haoran
    JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [2] Prediction of Future Vulnerability Discovery in Software Applications using Vulnerability Syntax Tree (PFVD-VST)
    Periyasamy, Kola
    Arirangan, Saranya
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 288 - 294
  • [3] Survey of Software Vulnerability Discovery Technology
    Wang, Wei
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON SOCIAL NETWORK, COMMUNICATION AND EDUCATION (SNCE 2017), 2017, 82 : 9 - 13
  • [4] Software Vulnerability Discovery Techniques: A Survey
    Liu, Bingchang
    Shi, Liang
    Cai, Zhuhua
    Li, Min
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 152 - 156
  • [5] Evaluation of Branch Prediction Vulnerability and New Vulnerability Discovery on ARM Processors
    Wang C.
    Tian R.
    Zhao X.
    Lü Y.
    Wang D.
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2021, 55 (07): : 71 - 78
  • [6] Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery
    Fulton, Kelsey R.
    Katcher, Samantha
    Song, Kevin
    Chetty, Marshini
    Mazurek, Michelle L.
    Messdaghi, Chloe
    Votipka, Daniel
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1997 - 2014
  • [7] Prediction capabilities of vulnerability discovery models
    Alhazmi, Omar H.
    Malaiya, Yashwant K.
    2006 PROCEEDINGS - ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, VOLS 1 AND 2, 2006, : 86 - +
  • [8] Variables are a Curse in Software Vulnerability Prediction
    Groppe, Jinghua
    Groppe, Sven
    Moeller, Ralf
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2023, PT I, 2023, 14146 : 516 - 521
  • [9] A Study on Software Vulnerability Prediction Model
    Shamal, P. K.
    Rahamathulla, K.
    Akbar, Ali
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 703 - 706
  • [10] Periodicity in software vulnerability discovery, patching and exploitation
    HyunChul Joh
    Yashwant K. Malaiya
    International Journal of Information Security, 2017, 16 : 673 - 690