Discovering Vulnerabilities and Patches for Open Source Security

被引:0
|
作者
Gunkel, Tamara [1 ]
Hupperich, Thomas [1 ]
机构
[1] Univ Munster, Dept Informat Syst, Munster, Germany
关键词
Web Security; Data Set Generation; Commit Classification;
D O I
10.5220/0011299400003266
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Open source software is used in numerous systems and security vulnerabilities in such software often affect many targets at once. Hence, it is crucial to find security vulnerabilities as soon as possible. A convenient method to check software for vulnerabilities is executing a static code analysis tool before deployment. However, for verifying the reliability of such tools, real-world data including labeled non-vulnerable and vulnerable code is required. This paper introduces an approach to automatically create and enhance a labeled data set of open source projects. The ground truth of vulnerabilities is extracted from up-to-date CVEs. We identify repositories related to known vulnerabilities, select vulnerable versions and take patch commits into account. In this context, we utilize Gradient Boosting based on regression trees as a meta classifier for associating patch commits to CWE categories. With a high precision of this matching, we give insights about the impact of certain vulnerabilities and a general overview of open source code security. Our findings may be used for future studies, such as the impact of certain code design criteria, e.g. clean code, on the prevalence of vulnerabilities.
引用
收藏
页码:641 / 648
页数:8
相关论文
共 50 条
  • [21] Known Vulnerabilities of Open Source Projects: Where Are the Fixes?
    Sabetta, Antonino
    Ponta, Serena Elisa
    Lozoya, Rocio Cabrera
    Bezzi, Michele
    Sacchetti, Tommaso
    Greco, Matteo
    Balogh, Gergo
    Hegedus, Peter
    Ferenc, Rudolf
    Paramitha, Ranindya
    Pashchenko, Ivan
    Papotti, Aurora
    Milankovich, Akos
    Massacci, Fabio
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 49 - 59
  • [22] Detecting Vulnerabilities Using Open-Source Intelligence
    Balaji, S. Jai
    Karmel, A.
    HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 530 - 540
  • [23] On the security of open source software
    Payne, C
    INFORMATION SYSTEMS JOURNAL, 2002, 12 (01) : 61 - 78
  • [24] Is Open Source Security a Myth?
    Schryen, Guido
    COMMUNICATIONS OF THE ACM, 2011, 54 (05) : 130 - +
  • [25] Security and trust in open source security tokens
    Schink M.
    Wagner A.
    Unterstein F.
    Heyszl J.
    1600, Ruhr-University of Bochum (2021): : 176 - 201
  • [26] Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking
    Tan, Xin
    Zhang, Yuan
    Mi, Chenyuan
    Cao, Jiajun
    Sun, Kun
    Lin, Yifan
    Yang, Min
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3282 - 3299
  • [27] VCMATCH: A Ranking-based Approach for Automatic Security Patches Localization for OSS Vulnerabilities
    Wang, Shichao
    Zhang, Yun
    Bao, Liagfeng
    Xia, Xin
    Wu, Minghui
    2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2022), 2022, : 589 - 600
  • [28] A Study Of Open Ports As Security Vulnerabilities In Common User Computers
    Mathew, Kuruvilla
    Tabassum, Mujahid
    Siok, Marlene Valerie Lu Ai
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST), 2014,
  • [29] The availability of source code in relation to timely response to security vulnerabilities
    Reinke, J
    Saiedian, H
    COMPUTERS & SECURITY, 2003, 22 (08) : 707 - 724
  • [30] Are Source Code Metrics "Good Enough" in Predicting Security Vulnerabilities?
    Ganesh, Sundarakrishnan
    Palma, Francis
    Olsson, Tobias
    DATA, 2022, 7 (09)