Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities

被引:0
|
作者
Sadeghi, Alireza [1 ]
Esfahani, Naeem [1 ]
Malek, Sam [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
Security Vulnerability; Mining Software Repositories; Software Analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security has become the Achilles' heel of most modern software systems. Techniques ranging from the manual inspection to automated static and dynamic analyses are commonly employed to identify security vulnerabilities prior to the release of the software. However, these techniques are time consuming and cannot keep up with the complexity of ever-growing software repositories (e.g., Google Play and Apple App Store). In this paper, we aim to improve the status quo and increase the efficiency of static analysis by mining relevant information from vulnerabilities found in the categorized software repositories. The approach relies on the fact that many modern software systems are developed using rich application development frameworks (ADF), allowing us to raise the level of abstraction for detecting vulnerabilities and thereby making it possible to classify the types of vulnerabilities that are encountered in a given category of application. We used open-source software repositories comprising more than 7 million lines of code to demonstrate how our approach can improve the efficiency of static analysis, and in turn, vulnerability detection.
引用
收藏
页码:155 / 169
页数:15
相关论文
共 50 条
  • [1] The Research on Software Security Vulnerabilities Mining
    Liu Shuyu
    Kong Weiguang
    Yang Diwei
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT AND INNOVATION (TMI 2010), 2010, : 333 - 335
  • [2] Mining Software Repositories - A Comparative Analysis
    Olatunji, Sunday O.
    Idrees, Syed U.
    Al-Ghamdi, Yasser S.
    Al-Ghamdi, Jarallah Saleh Ali
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 161 - 174
  • [3] On the Detection and Analysis of Software Security Vulnerabilities
    Wijesiriwardana, Chaman
    Wimalaratne, Prasad
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [4] Mining software repositories
    1600, Japan Society for Software Science and Technology (30):
  • [5] Visual data mining and analysis of software repositories
    Voinea, Lucian
    Telea, Alexandru
    COMPUTERS & GRAPHICS-UK, 2007, 31 (03): : 410 - 428
  • [6] Tracing known security vulnerabilities in software repositories - A Semantic Web enabled modeling approach
    Alqahtani, Sultan S.
    Eghan, Ellis E.
    Rilling, Juergen
    SCIENCE OF COMPUTER PROGRAMMING, 2016, 121 : 153 - 175
  • [7] Trustrace: Mining Software Repositories to Improve the Accuracy of Requirement Traceability Links
    Ali, Nasir
    Gueheneuc, Yann-Gael
    Antoniol, Giuliano
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2013, 39 (05) : 725 - 741
  • [8] Mining Open Software Repositories
    Alonso Abad, Jesus
    Lopez Nozal, Carlos
    Maudes Raedo, Jesus M.
    ERCIM NEWS, 2014, (99): : 23 - 24
  • [9] Software security vulnerabilities analysis method based on frequent sequential pattern mining and sequence clustering
    Wu, Di
    Ren, Jia-Dong
    ICIC Express Letters, 2014, 8 (08): : 2113 - 2119
  • [10] Ethics in the mining of software repositories
    Nicolas E. Gold
    Jens Krinke
    Empirical Software Engineering, 2022, 27