Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities

被引:0
|
作者
Sadeghi, Alireza [1 ]
Esfahani, Naeem [1 ]
Malek, Sam [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
Security Vulnerability; Mining Software Repositories; Software Analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security has become the Achilles' heel of most modern software systems. Techniques ranging from the manual inspection to automated static and dynamic analyses are commonly employed to identify security vulnerabilities prior to the release of the software. However, these techniques are time consuming and cannot keep up with the complexity of ever-growing software repositories (e.g., Google Play and Apple App Store). In this paper, we aim to improve the status quo and increase the efficiency of static analysis by mining relevant information from vulnerabilities found in the categorized software repositories. The approach relies on the fact that many modern software systems are developed using rich application development frameworks (ADF), allowing us to raise the level of abstraction for detecting vulnerabilities and thereby making it possible to classify the types of vulnerabilities that are encountered in a given category of application. We used open-source software repositories comprising more than 7 million lines of code to demonstrate how our approach can improve the efficiency of static analysis, and in turn, vulnerability detection.
引用
收藏
页码:155 / 169
页数:15
相关论文
共 50 条
  • [31] Guest Editorial: Mining software repositories
    Robbes, Romain
    Kamei, Yasutaka
    Pinzger, Martin
    EMPIRICAL SOFTWARE ENGINEERING, 2017, 22 (03) : 1143 - 1145
  • [32] Mining Software Repositories for Social Norms
    Dam, Hoa Khanh
    Savarimuthu, Bastin Tony Roy
    Avery, Daniel
    Ghose, Aditya
    2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol 2, 2015, : 627 - 630
  • [33] Mining Software Repositories for Security: Data Quality Issues Lessons from Trenches (Keynote)
    Babar, Muhammad Ali
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON MINING SOFTWARE REPOSITORIES APPLICATIONS FOR PRIVACY AND SECURITY, MSR4P&S 2022, 2022, : 1 - 1
  • [34] Software Process Simulation based on Mining Software Repositories
    Honsel, Verena
    Honsel, Daniel
    Grabowski, Jens
    2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2014, : 828 - 831
  • [35] Analysis of computational vulnerabilities in digital repositories
    Belarmino, Valdete Fernandes
    de Araujo, Wagner Junqueira
    BIBLIOS-REVISTA DE BIBLIOTECOLOGIA Y CIENCIAS DE LA INFORMACION, 2014, (56): : 1 - 18
  • [36] Analysis of Software Vulnerabilities, Measures for Prevention and Protection and Security Testing
    Nakov, Ognian
    Trifonov, Roumen
    Pavlova, Galya
    Nakov, Plamen
    2021 29TH NATIONAL CONFERENCE WITH INTERNATIONAL PARTICIPATION (TELECOM), 2021, : 73 - 76
  • [37] Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis
    Wang, Wentao
    Dumont, Faryn
    Niu, Nan
    Horton, Glen
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (05) : 1665 - 1675
  • [38] On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids
    Mathas, Christos-Minas
    Vassilakis, Costas
    Kolokotronis, Nicholas
    Zarakovitis, Charilaos C.
    Kourtis, Michail-Alexandros
    ENERGIES, 2021, 14 (10)
  • [39] Mining trends and patterns of software vulnerabilities
    Murtaza, Syed Shariyar
    Khreich, Wael
    Hamou-Lhadj, Abdelwahab
    Bener, Ayse Basar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 117 : 218 - 228
  • [40] Software Metrics as Indicators of Security Vulnerabilities
    Medeiros, Nadia
    Ivaki, Naghmeh
    Costa, Pedro
    Vieira, Marco
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 216 - 227