Security Evaluation Criteria of Open-Source Libraries

被引:0
|
作者
Mills, Vivian [1 ]
Butakov, Sergey [1 ]
机构
[1] Concordia Univ Edmonton, Ada Blvd, Edmonton, AB AB 7128, Canada
关键词
Software security; Risk management; Supply chain attacks; Modern code review; Vulnerability management;
D O I
10.1007/978-3-031-10548-7_31
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The use of freely available, open-source code to reduce the time needed to create new software or add functionality to existing software is a common practice. With analysis of recent high-profile cases of open-source software packages being corrupted by the original developer, or the introduction of remote backdoor functionality by malicious actors, it has been shown that there is much that can be done to help with simplifying the decision-making process of using any open-source code. This paper provides the basis for a simple-to-use checklist that can be used to quickly analyze open-source libraries for its suitability within an individual's or organization's code base. Fourteen projects were selected at random from a popular code hosting site that made use of specific biometric security libraries. The conclusions derived from the use of the checklist and the analysis of the selected projects will help with simplifying the decision-making process of using open-source code for software projects.
引用
收藏
页码:422 / 435
页数:14
相关论文
共 50 条
  • [31] Evaluation of Open-Source Tools for Differential Privacy
    Zhang, Shiliang
    Hagermalm, Anton
    Slavnic, Sanjin
    Schiller, Elad Michael
    Almgren, Magnus
    SENSORS, 2023, 23 (14)
  • [32] Toward Automated Exploit Generation for Known Vulnerabilities in Open-Source Libraries
    Iannone, Emanuele
    Di Nucci, Dario
    Sabetta, Antonino
    De Lucia, Andrea
    2021 IEEE/ACM 29TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2021), 2021, : 396 - 400
  • [33] Open-source libraries ease migration from VxWorks and pSOS to Linux
    Wong, W
    ELECTRONIC DESIGN, 2001, 49 (02) : 28 - 28
  • [34] Space Debries Decay Estimation Software using Open-Source Libraries
    Mateiasi, Cezara
    Barbulescu, Lucian-Florentin
    Popa, Liliana-Didi
    2019 23RD INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2019, : 598 - 602
  • [35] Demystifying the Impact of Open-Source Machine Learning Libraries on Software Analytics
    Zhao, Yu
    Gong, Yihui
    Gong, Lina
    Jiang, Shujuan
    Huang, Zhiqiu
    IEEE TRANSACTIONS ON RELIABILITY, 2024,
  • [36] A Comprehensive Comparison of Open-Source Libraries for Handwritten Text Recognition in Norwegian
    Maarand, Martin
    Beyer, Yngvil
    Kasen, Andre
    Fosseide, Knut T.
    Kermorvant, Christopher
    DOCUMENT ANALYSIS SYSTEMS, DAS 2022, 2022, 13237 : 399 - 413
  • [37] Security issues in information systems based on open-source technologies
    Greiner, S
    Boskovic, B
    Brest, J
    Zumer, V
    IEEE REGION 8 EUROCON 2003, VOL B, PROCEEDINGS: COMPUTER AS A TOOL, 2003, : 12 - 15
  • [38] An Open-Source Proactive Security Infrastructure For Business Process Management
    Jesus Varela-Vaca, Angel
    Teresa Gomez-Lopez, Maria
    Jimenez Vargas, David
    Gasca, Rafael M.
    Suarez Fabrega, Antonio J.
    Abad Herrera, Pedro J.
    INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, 2015, : 1671 - 1678
  • [39] File Formats Security - Proprietary vs. Open-Source
    Laugasson, Edmund
    Kikkas, Kaido
    LEARNING AND COLLABORATION TECHNOLOGIES: DESIGNING AND DEVELOPING NOVEL LEARNING EXPERIENCES, PT I, 2014, 8523 : 63 - 72
  • [40] ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
    O'Flynn, Colin
    Chen, Zhizhang
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2014, 8622 : 243 - 260