Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database

被引:39
|
作者
Rahimi, Sanaz [1 ]
Zargham, Mehdi [1 ]
机构
[1] So Illinois Univ, Dept Comp Sci, Carbondale, IL 62901 USA
关键词
Code security; static analysis; vulnerability discovery model; vulnerability prediction;
D O I
10.1109/TR.2013.2257052
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Predicting software vulnerability discovery trends can help improve secure deployment of software applications and facilitate backup provisioning, disaster recovery, diversity planning, and maintenance scheduling. Vulnerability discovery models (VDMs) have been studied in the literature as a means to capture the underlying stochastic process. Based on the VDMs, a few vulnerability prediction schemes have been proposed. Unfortunately, all these schemes suffer from the same weaknesses: they require a large amount of historical vulnerability data from a database (hence they are not applicable to a newly released software application), their precision depends on the amount of training data, and they have significant amount of error in their estimates. In this work, we propose vulnerability scrying, a new paradigm for vulnerability discovery prediction based on code properties. Using compiler-based static analysis of a codebase, we extract code properties such as code complexity (cyclomatic complexity), and more importantly code quality (compliance with secure coding rules), from the source code of a software application. Then we propose a stochastic model which uses code properties as its parameters to predict vulnerability discovery. We have studied the impact of code properties on the vulnerability discovery trends by performing static analysis on the source code of four real-world software applications. We have used our scheme to predict vulnerability discovery in three other software applications. The results show that even though we use no historical data in our prediction, vulnerability scrying can predict vulnerability discovery with better precision and less divergence over time.
引用
收藏
页码:395 / 407
页数:13
相关论文
共 50 条
  • [21] Automatic software vulnerability classification by extracting vulnerability triggers
    Sun, Xiaobing
    Li, Lili
    Bo, Lili
    Wu, Xiaoxue
    Wei, Ying
    Li, Bin
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2024, 36 (02)
  • [22] Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions
    Al-Banna, Mortada
    Benatallah, Boualem
    Barukh, Moshe C.
    Bertino, Elisa
    Kanhere, Salil
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2021, PT I, 2021, 13080 : 3 - 13
  • [23] Processor Vulnerability Discovery
    Lyu, Yongqiang
    Sun, Rihui
    Qu, Gang
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [24] A New Method to Construct the Software Vulnerability Model
    Li, Xiang
    Chen, Jinfu
    Lin, Zhechao
    Zhang, Lin
    Wang, Zibin
    Zhou, Minmin
    Xie, Wanggen
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 225 - 229
  • [25] A Software Assessment Method Based on Relevance Vulnerability
    Miao, Xudong
    Wang, Yongchun
    Cao, Xingchen
    Qu, Binbin
    Jiang, Sheng
    Fang, Feng
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 424 - 427
  • [26] Time between vulnerability disclosures: A measure of software product vulnerability
    Johnson, Pontus
    Gorton, Dan
    Lagerstrom, Robert
    Ekstedt, Mathias
    COMPUTERS & SECURITY, 2016, 62 : 278 - 295
  • [27] Vulnerability severity prediction and risk metric modeling for software
    Xiaoling Zhu
    Chenglong Cao
    Jing Zhang
    Applied Intelligence, 2017, 47 : 828 - 836
  • [28] The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models
    Stuckman, Jeffrey
    Walden, James
    Scandariato, Riccardo
    IEEE TRANSACTIONS ON RELIABILITY, 2017, 66 (01) : 17 - 37
  • [29] Vulnerability severity prediction and risk metric modeling for software
    Zhu, Xiaoling
    Cao, Chenglong
    Zhang, Jing
    APPLIED INTELLIGENCE, 2017, 47 (03) : 828 - 836
  • [30] Software Vulnerability Prediction Models Based on Complex Network
    Zhao, Xiao-lin
    Chen, Quan-bao
    Gao, Jia-tong
    Zhang, Xian-hua
    Ding, Jian-yang
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017), 2017, : 64 - 73