Discovering Vulnerabilities and Patches for Open Source Security

被引:0
|
作者
Gunkel, Tamara [1 ]
Hupperich, Thomas [1 ]
机构
[1] Univ Munster, Dept Informat Syst, Munster, Germany
关键词
Web Security; Data Set Generation; Commit Classification;
D O I
10.5220/0011299400003266
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Open source software is used in numerous systems and security vulnerabilities in such software often affect many targets at once. Hence, it is crucial to find security vulnerabilities as soon as possible. A convenient method to check software for vulnerabilities is executing a static code analysis tool before deployment. However, for verifying the reliability of such tools, real-world data including labeled non-vulnerable and vulnerable code is required. This paper introduces an approach to automatically create and enhance a labeled data set of open source projects. The ground truth of vulnerabilities is extracted from up-to-date CVEs. We identify repositories related to known vulnerabilities, select vulnerable versions and take patch commits into account. In this context, we utilize Gradient Boosting based on regression trees as a meta classifier for associating patch commits to CWE categories. With a high precision of this matching, we give insights about the impact of certain vulnerabilities and a general overview of open source code security. Our findings may be used for future studies, such as the impact of certain code design criteria, e.g. clean code, on the prevalence of vulnerabilities.
引用
收藏
页码:641 / 648
页数:8
相关论文
共 50 条
  • [31] An empirical study of supplementary patches in open source projects
    Jihun Park
    Miryung Kim
    Doo-Hwan Bae
    Empirical Software Engineering, 2017, 22 : 436 - 473
  • [32] An empirical study of supplementary patches in open source projects
    Park, Jihun
    Kim, Miryung
    Bae, Doo-Hwan
    EMPIRICAL SOFTWARE ENGINEERING, 2017, 22 (01) : 436 - 473
  • [33] Patch Finder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software
    Li, Kaixuan
    Zhang, Jian
    Chen, Sen
    Liu, Han
    Liu, Yang
    Chen, Yixiang
    PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 2024, : 590 - 602
  • [34] An empirical investigation into open source web applications’ implementation vulnerabilities
    Toan Huynh
    James Miller
    Empirical Software Engineering, 2010, 15 : 556 - 576
  • [35] Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem
    Zhang, Lyuye
    Liu, Chengwei
    Chen, Sen
    Xu, Zhengzi
    Fan, Lingling
    Zhao, Lida
    Zhang, Yiran
    Liu, Yang
    2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, : 191 - 203
  • [36] Impact Assessment for Vulnerabilities in Open-Source Software Libraries
    Plate, Henrik
    Ponta, Serena Elisa
    Sabetta, Antonino
    2015 31ST INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME) PROCEEDINGS, 2015, : 411 - 420
  • [37] STUDYING OPEN SOURCE VULNERABILITY SCANNERS FOR VULNERABILITIES IN WEB APPLICATIONS
    Sagar, Deepika
    Kukreja, Sahil
    Brahma, Jwngfu
    Tyagi, Shobha
    Jain, Prateek
    IIOAB JOURNAL, 2018, 9 (02) : 43 - 49
  • [38] An empirical investigation into open source web applications' implementation vulnerabilities
    Huynh, Toan
    Miller, James
    EMPIRICAL SOFTWARE ENGINEERING, 2010, 15 (05) : 556 - 576
  • [39] Exploiting Military OpSec through Open-Source Vulnerabilities
    Dressler, Judson C.
    Bronk, Christopher
    Wallach, Daniel S.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 450 - 458
  • [40] A Source Code Review Method for Discovering Security Flaws Efficiently
    Zhou, Cheng
    Li, Yong
    Li, Weiwei
    Wang, Chen
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ELECTROMECHANICAL CONTROL TECHNOLOGY AND TRANSPORTATION, 2015, 41 : 414 - 419