Security Evaluation Criteria of Open-Source Libraries

被引:0
|
作者
Mills, Vivian [1 ]
Butakov, Sergey [1 ]
机构
[1] Concordia Univ Edmonton, Ada Blvd, Edmonton, AB AB 7128, Canada
关键词
Software security; Risk management; Supply chain attacks; Modern code review; Vulnerability management;
D O I
10.1007/978-3-031-10548-7_31
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use of freely available, open-source code to reduce the time needed to create new software or add functionality to existing software is a common practice. With analysis of recent high-profile cases of open-source software packages being corrupted by the original developer, or the introduction of remote backdoor functionality by malicious actors, it has been shown that there is much that can be done to help with simplifying the decision-making process of using any open-source code. This paper provides the basis for a simple-to-use checklist that can be used to quickly analyze open-source libraries for its suitability within an individual's or organization's code base. Fourteen projects were selected at random from a popular code hosting site that made use of specific biometric security libraries. The conclusions derived from the use of the checklist and the analysis of the selected projects will help with simplifying the decision-making process of using open-source code for software projects.
引用
收藏
页码:422 / 435
页数:14
相关论文
共 50 条
  • [21] Data on security requirements in open-source software projects
    Wang, Wentao
    Mahakala, Kavya Reddy
    Gupta, Arushi
    Hussein, Nesrin
    Wang, Yinglin
    DATA IN BRIEF, 2019, 25
  • [22] A Case for Open-Source Surveys (for Assessing Security Literacy)
    Bonilla, Rafael I.
    PROCEEDINGS OF 2017 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON2017), 2017, : 1837 - 1842
  • [23] SEcube™: An Open-Source Security Platform in a Single SoC
    Varriale, Antonio
    Vatajelu, Elena Ioana
    Di Natale, Giorgio
    Prinetto, Paolo
    Trotta, Pascal
    Margaria, Tiziana
    2016 11TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS), 2016,
  • [24] Survey on Open-source Software Supply Chain Security
    Ji S.-L.
    Wang Q.-Y.
    Chen A.-Y.
    Zhao B.-B.
    Ye T.
    Zhang X.-H.
    Wu J.-Z.
    Li Y.
    Yin J.-W.
    Wu Y.-J.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (03): : 1330 - 1364
  • [25] An Empirical Investigation of the Security Weaknesses in Open-Source Projects
    Al-Shammare, Haifa A.
    Al-Otaiby, Nehal F.
    Al-Otabi, Muradi M.
    Alshayeb, Mohammad R.
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 634 - 642
  • [26] SecTKG: A Knowledge Graph for Open-Source Security Tools
    Sun, Siqi
    Huang, Cheng
    Wu, Tiejun
    Shen, Yi
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2023, 2023
  • [27] Code Ownership in Open-Source AI Software Security
    Wen, Jiawen
    Yuari, Dong
    Ma, Lei
    Chen, Huaming
    PROCEEDINGS OF THE 2024 IEEE/ACM INTERNATIONAL WORKSHOP ON RESPONSIBLE AI ENGINEERING, RAIE 2024, 2024, : 28 - 35
  • [28] Evaluation indicators for open-source software: a review
    Yuhang Zhao
    Ruigang Liang
    Xiang Chen
    Jing Zou
    Cybersecurity, 4
  • [29] Evaluation indicators for open-source software: a review
    Zhao, Yuhang
    Liang, Ruigang
    Chen, Xiang
    Zou, Jing
    CYBERSECURITY, 2021, 4 (01)
  • [30] Comparative evaluation of an open-source FDM system
    Johnson, Wayne M.
    Rowell, Matthew
    Deason, Bill
    Eubanks, Malik
    RAPID PROTOTYPING JOURNAL, 2014, 20 (03) : 205 - 214