Discovering Vulnerabilities and Patches for Open Source Security

被引:0
|
作者
Gunkel, Tamara [1 ]
Hupperich, Thomas [1 ]
机构
[1] Univ Munster, Dept Informat Syst, Munster, Germany
关键词
Web Security; Data Set Generation; Commit Classification;
D O I
10.5220/0011299400003266
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Open source software is used in numerous systems and security vulnerabilities in such software often affect many targets at once. Hence, it is crucial to find security vulnerabilities as soon as possible. A convenient method to check software for vulnerabilities is executing a static code analysis tool before deployment. However, for verifying the reliability of such tools, real-world data including labeled non-vulnerable and vulnerable code is required. This paper introduces an approach to automatically create and enhance a labeled data set of open source projects. The ground truth of vulnerabilities is extracted from up-to-date CVEs. We identify repositories related to known vulnerabilities, select vulnerable versions and take patch commits into account. In this context, we utilize Gradient Boosting based on regression trees as a meta classifier for associating patch commits to CWE categories. With a high precision of this matching, we give insights about the impact of certain vulnerabilities and a general overview of open source code security. Our findings may be used for future studies, such as the impact of certain code design criteria, e.g. clean code, on the prevalence of vulnerabilities.
引用
收藏
页码:641 / 648
页数:8
相关论文
共 50 条
  • [41] 'Patches don't have gender': What is not open in open source software
    Nafus, Dawn
    NEW MEDIA & SOCIETY, 2012, 14 (04) : 669 - 683
  • [42] Security of Open Source Web Applications
    Walden, James
    Doyle, Maureen
    Welch, Grant A.
    Whelan, Michael
    ESEM: 2009 3RD INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2009, : 546 - 554
  • [43] Open source security: Opportunity or oxymoron?
    Lawton, G
    COMPUTER, 2002, 35 (03) : 18 - 21
  • [44] Increased security through open source
    Hoepman, Jaap-Henk
    Jacobs, Bart
    COMMUNICATIONS OF THE ACM, 2007, 50 (01) : 79 - 83
  • [45] Security Evaluation of Open Source Clouds
    Ristov, Sasko
    Gusev, Marjan
    2013 IEEE EUROCON, 2013, : 73 - 79
  • [46] Open source in security: Visiting the bizarre
    Schneider, FB
    2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 126 - 127
  • [47] Discovering Vulnerabilities in Heterogeneous Interconnected Systems
    Faramondi, Luca
    Oliva, Gabriele
    Panzieri, Stefano
    Setola, Roberto
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2018), 2019, 11260 : 204 - 215
  • [48] Understanding and Discovering SQL Injection Vulnerabilities
    Sarhan, Abdullaziz A.
    Farhan, Shehab A.
    Al-Harby, Fahad M.
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 45 - 51
  • [49] Static analysis for discovering IoT vulnerabilities
    Pietro Ferrara
    Amit Kr Mandal
    Agostino Cortesi
    Fausto Spoto
    International Journal on Software Tools for Technology Transfer, 2021, 23 : 71 - 88
  • [50] DISCOVERING EPASSPORT VULNERABILITIES USING BISIMILARITY
    Horne, Ross
    Mauw, Sjouke
    LOGICAL METHODS IN COMPUTER SCIENCE, 2021, 17 (02) : 24:1 - 24:52