PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities

被引:8
|
作者
Li, Qiang [1 ]
Song, Jinke [1 ]
Tan, Dawei [1 ]
Wang, Haining [2 ]
Liu, Jiqiang [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[2] Virginia Polytech Inst & State Univ, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
D O I
10.1109/DSN48987.2021.00031
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The reuse of libraries in software development has become prevalent for improving development efficiency and software quality. However, security vulnerabilities of reused libraries propagated through software project dependency pose a severe security threat, but they have not yet been well studied. In this paper, we present the first large-scale empirical study of project dependencies with respect to security vulnerabilities. We developed PDGraph, an innovative approach for analyzing publicly known security vulnerabilities among numerous project dependencies, which provides a new perspective for assessing security risks in the wild. As a large-scale software collection in dependency, we find 337,415 projects and 1,385,338 dependency relations. In particular, PDGraph generates a project dependency graph, where each node is a project, and each edge indicates a dependency relationship. We conducted experiments to validate the efficacy of PDGraph and characterized its features for security analysis. We revealed that 1,014 projects have publicly disclosed vulnerabilities, and more than 67,806 projects are directly dependent on them. Among these, 42,441 projects still manifest 67,581 insecure dependency relationships, indicating that they are built on vulnerable versions of reused libraries even though their vulnerabilities are publicly known. During our eight-month observation period, only 1,266 insecure edges were fixed, and corresponding vulnerable libraries were updated to secure versions. Furthermore, we uncovered four underlying dependency risks that can significantly reduce the difficulty of compromising systems. We conducted a quantitative analysis of dependency risks on the PDGraph.
引用
收藏
页码:161 / 173
页数:13
相关论文
共 50 条
  • [1] A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments
    Iosif, Andrei-Cristian
    Gasiba, Tiago Espinha
    Zhao, Tiange
    Lechner, Ulrike
    Pinto-Albuquerque, Maria
    [J]. UBIQUITOUS SECURITY, 2022, 1557 : 171 - 188
  • [2] Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security
    Zhang, Mengyuan
    de Carnavalet, Xavier de Carne
    Wang, Lingyu
    Ragab, Ahmed
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (09) : 2315 - 2330
  • [3] A Large-Scale Empirical Study of Security Patches
    Li, Frank
    Paxson, Vern
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2201 - 2215
  • [4] The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study
    Iannone, Emanuele
    Guadagni, Roberta
    Ferrucci, Filomena
    De Lucia, Andrea
    Palomba, Fabio
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (01) : 44 - 63
  • [5] Key Factors in Coping with Large-Scale Security Vulnerabilities in the eID Field
    Lips, Silvia
    Pappel, Ingrid
    Tsap, Valentyna
    Draheim, Dirk
    [J]. ELECTRONIC GOVERNMENT AND THE INFORMATION SYSTEMS PERSPECTIVE, EGOVIS 2018, 2018, 11032 : 60 - 70
  • [6] A Large-Scale Study on Vulnerabilities in Linux using Vtopia
    Shao, Yanjie
    Wu, Yanjun
    Yang, Mutian
    Luo, Tianyue
    Wu, Jingzheng
    [J]. 2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 1033 - 1042
  • [7] A Large-Scale Empirical Study of Conficker
    Shin, Seungwon
    Gu, Guofei
    Reddy, Narasimha
    Lee, Christopher P.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 676 - 690
  • [8] An Empirical Study on Organizational Culture of Large-scale Construction Project Organization in China
    Lu Yan
    Chen Shouke
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON CONSTRUCTION & REAL ESTATE MANAGEMENT, VOLS 1 AND 2, 2008, : 632 - 635
  • [9] LARGE-SCALE PROJECT
    MILI, M
    [J]. TELECOMMUNICATION JOURNAL, 1975, 42 (02): : 68 - 70
  • [10] Conficker and Beyond: A Large-Scale Empirical Study
    Shin, Seungwon
    Gu, Guofei
    [J]. 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 151 - 160