Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities

被引:0
|
作者
Sadeghi, Alireza [1 ]
Esfahani, Naeem [1 ]
Malek, Sam [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
Security Vulnerability; Mining Software Repositories; Software Analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security has become the Achilles' heel of most modern software systems. Techniques ranging from the manual inspection to automated static and dynamic analyses are commonly employed to identify security vulnerabilities prior to the release of the software. However, these techniques are time consuming and cannot keep up with the complexity of ever-growing software repositories (e.g., Google Play and Apple App Store). In this paper, we aim to improve the status quo and increase the efficiency of static analysis by mining relevant information from vulnerabilities found in the categorized software repositories. The approach relies on the fact that many modern software systems are developed using rich application development frameworks (ADF), allowing us to raise the level of abstraction for detecting vulnerabilities and thereby making it possible to classify the types of vulnerabilities that are encountered in a given category of application. We used open-source software repositories comprising more than 7 million lines of code to demonstrate how our approach can improve the efficiency of static analysis, and in turn, vulnerability detection.
引用
收藏
页码:155 / 169
页数:15
相关论文
共 50 条
  • [1] The Research on Software Security Vulnerabilities Mining
    Liu Shuyu
    Kong Weiguang
    Yang Diwei
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT AND INNOVATION (TMI 2010), 2010, : 333 - 335
  • [2] Mining Software Repositories - A Comparative Analysis
    Olatunji, Sunday O.
    Idrees, Syed U.
    Al-Ghamdi, Yasser S.
    Al-Ghamdi, Jarallah Saleh Ali
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 161 - 174
  • [3] On the Detection and Analysis of Software Security Vulnerabilities
    Wijesiriwardana, Chaman
    Wimalaratne, Prasad
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [4] Visual data mining and analysis of software repositories
    Voinea, Lucian
    Telea, Alexandru
    [J]. COMPUTERS & GRAPHICS-UK, 2007, 31 (03): : 410 - 428
  • [5] Tracing known security vulnerabilities in software repositories - A Semantic Web enabled modeling approach
    Alqahtani, Sultan S.
    Eghan, Ellis E.
    Rilling, Juergen
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2016, 121 : 153 - 175
  • [6] Trustrace: Mining Software Repositories to Improve the Accuracy of Requirement Traceability Links
    Ali, Nasir
    Gueheneuc, Yann-Gael
    Antoniol, Giuliano
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2013, 39 (05) : 725 - 741
  • [7] Mining Open Software Repositories
    Alonso Abad, Jesus
    Lopez Nozal, Carlos
    Maudes Raedo, Jesus M.
    [J]. ERCIM NEWS, 2014, (99): : 23 - 24
  • [8] Ethics in the mining of software repositories
    Nicolas E. Gold
    Jens Krinke
    [J]. Empirical Software Engineering, 2022, 27
  • [9] A Survey on Mining Software Repositories
    Jung, Woosung
    Lee, Eunjoo
    Wu, Chisu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (05): : 1384 - 1406
  • [10] Impact analysis by mining software and change request repositories
    Canfora, G
    Cerulo, L
    [J]. 2005 11TH INTERNATIONAL SYMPOSIUM ON SOFTWARE METRICS (METRICS), 2005, : 259 - 267