Are Third-Party Libraries Secure? A Software Library Checker for Java']Java

被引:1
|
作者
Viertel, Fabien Patrick [1 ]
Kortum, Fabian [1 ]
Wagner, Leif [1 ]
Schneider, Kurt [1 ]
机构
[1] Leibniz Univ Hannover, Software Engn Grp, Hannover, Germany
来源
关键词
Software library; Vulnerability database; Metadata;
D O I
10.1007/978-3-030-12143-3_2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, there are many software libraries for different purposes that are used by various projects. An application is only as secure as its weakest component; thus if an imported library includes a certain vulnerability, an application could get insecure. Therefore a widespread search for existing security flaws within used libraries is necessary. Big databases like the National Vulnerability Database (NVD) comprise reported security incidents and can be utilized to determine whether a software library is secure or not. This classification is a very time-consuming and exhausting task. We have developed a tool-based automated approach for supporting developers in this complex task through heuristics embedded in an eclipse plugin. Documented vulnerabilities stored in databases will be taken into consideration for the security classification of libraries. Weaknesses do not always entail the same consequences; a scoring that identifies the criticality oriented on their potential consequences is applied. In this paper, a method for the enrichment of knowledge containing vulnerability databases is considered. Our approach is focussing on the scope of software weaknesses, which are library reasoned and documented in vulnerability databases. The Java Library Checker was implemented as eclipse plugin for supporting developers to make potential insecure third-party libraries visible to them.
引用
收藏
页码:18 / 34
页数:17
相关论文
共 50 条
  • [1] Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java']Java Projects
    Zhang, Lyuye
    Liu, Chengwei
    Xu, Zhengzi
    Chen, Sen
    Fan, Lingling
    Zhao, Lida
    Wu, Jiahui
    Liu, Yang
    [J]. 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 2540 - 2552
  • [2] Characterizing usages, updates and risks of third-party libraries in Java']Java projects
    Huang, Kaifeng
    Chen, Bihuan
    Xu, Congying
    Wang, Ying
    Shi, Bowen
    Peng, Xin
    Wu, Yijian
    Liu, Yang
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2022, 27 (04)
  • [3] Software Ingredients: Detection of Third-party Component Reuse in Java']Java Software Release
    Ishio, Takashi
    Kula, Raula Gaikovina
    Kanda, Tetsuya
    German, Daniel M.
    Inoue, Katsuro
    [J]. 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), 2016, : 339 - 350
  • [4] An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java']Java Projects
    Wang, Ying
    Chen, Bihuan
    Huang, Kaifeng
    Shi, Bowen
    Xu, Congying
    Peng, Xin
    Wu, Yijian
    Liu, Yang
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2020), 2020, : 35 - 45
  • [5] XtraLibD: Detecting Irrelevant Third-Party Libraries in Java']Java and Python']Python Applications
    Kapur, Ritu
    Rao, Poojith U.
    Dewam, Agrim
    Sodhi, Balwinder
    [J]. EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE 2021), 2022, 1556 : 132 - 155
  • [6] A Server-Side Java']JavaScript Security Architecture for Secure Integration of Third-Party Libraries
    van Ginkel, Neline
    De Groef, Willem
    Massacci, Fabio
    Piessens, Frank
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [7] MIGRATIONMINER: An Automated Detection Tool of Third-Party Java']Java Library Migration at the Method Level
    Alrubaye, Hussein
    Mkaouer, Mohamed Wiem
    Ouni, Ali
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), 2019, : 414 - 417
  • [8] Characterizing usages, updates and risks of third-party libraries in Java projects
    Kaifeng Huang
    Bihuan Chen
    Congying Xu
    Ying Wang
    Bowen Shi
    Xin Peng
    Yijian Wu
    Yang Liu
    [J]. Empirical Software Engineering, 2022, 27
  • [9] Identifying Vulnerable Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries
    Chen, Tianyu
    Li, Lin
    Shan, Bingjie
    Liang, Guangtai
    Li, Ding
    Wang, Qianxiang
    Xie, Tao
    [J]. arXiv, 2023,
  • [10] On the Use of Information Retrieval to Automate the Detection of Third-Party Java']Java Library Migration at the Method Level
    Alrubaye, Hussein
    Mkaouer, Mohamed Wiem
    Ouni, Ali
    [J]. 2019 IEEE/ACM 27TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2019), 2019, : 347 - 357