A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages

被引:2
|
作者
Antal, Gabor [1 ]
Mosolygo, Balazs [1 ]
Vandor, Norbert [1 ]
Hegedus, Peter [1 ,2 ]
机构
[1] Univ Szeged, Dept Software Engn, Szeged, Hungary
[2] MTA SZTE Res Grp Artificial Intelligence, Szeged, Hungary
关键词
CVE; CWE; Data mining; Software security; Vulnerability analysis;
D O I
10.1007/978-3-030-58811-3_72
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The number of people accessing online services is increasing day by day, and with new users, comes a greater need for effective and responsive cyber-security. Our goal in this study was to find out if there are common patterns within the most widely used programming languages in terms of security issues and fixes. In this paper, we showcase some statistics based on the data we extracted for these languages. Analyzing the more popular ones, we found that the same security issues might appear differently in different languages, and as such the provided solutions may vary just as much. We also found that projects with similar sizes can produce extremely different results, and have different common weaknesses, even if they provide a solution to the same task. These statistics may not be entirely indicative of the projects' standards when it comes to security, but they provide a good reference point of what one should expect. Given a larger sample size they could be made even more precise, and as such a better understanding of the security relevant activities within the projects written in given languages could be achieved.
引用
收藏
页码:1019 / 1034
页数:16
相关论文
共 50 条
  • [31] DETECT POLYMORPHIC WORMS BASED ON SEMANTIC SIGNATURE AND DATA-MINING
    Wang Wei
    Luo Dai-sheng
    Zhang Jianmin
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [32] Mining inline cache data to order inferred types in dynamic languages
    Milojkovic, Nevena
    Bera, Clement
    Ghafari, Mohammad
    Nierstrasz, Oscar
    SCIENCE OF COMPUTER PROGRAMMING, 2018, 161 : 105 - 121
  • [33] CUTTING CONDITION DECISION METHODOLOGY BASED ON DATA-MINING OF TOOL CATALOG DATA
    Kodama, Hiroyuki
    Hirogaki, Toshiki
    Aoyama, Eiichi
    Ogawa, Keiji
    PROCEEDINGS OF THE ASME INTERNATIONAL MANUFACTURING SCIENCE AND ENGINEERING CONFERENCE 2010, VOL 2, 2011, : 491 - 499
  • [34] Data-mining massive time series astronomical data sets - A case study
    Ng, MK
    Huang, ZX
    Hegland, M
    RESEARCH AND DEVELOPMENT IN KNOWLEDGE DISCOVERY AND DATA MINING, 1998, 1394 : 401 - 402
  • [35] Contactless hand detection in complex image based on data-mining process
    Ben Jemaa, Salma
    Hammami, Mohamed
    Ben-Abdallah, Hanene
    2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2013,
  • [36] Constraint-based control of boiler efficiency: A data-mining approach
    Song, Zhe
    Kusiak, Andrew
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2007, 3 (01) : 73 - 83
  • [37] A Combined Wavelet and Data-Mining Based Intelligent Protection Scheme for Microgrid
    Mishra, Debi Prasad
    Samantaray, Subhransu Ranjan
    Joos, Geza
    IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (05) : 2295 - 2304
  • [38] Risk-Management by Probability-Based Patterns in Data-Mining
    Kargar, M.
    Fartash, F.
    Mirmiran, R.
    Saderi, T.
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 1284 - +
  • [39] Data-Mining Model Based Intelligent Differential Microgrid Protection Scheme
    Kar, Susmita
    Samantaray, S. R.
    Zadeh, M. Dadash
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 1161 - 1169
  • [40] Identification of Prognostic and Predictive Biomarkers and Druggable Targets among 205 Antioxidant Genes in 21 Different Tumor Types via Data-Mining
    Ozenver, Nadire
    Efferth, Thomas
    PHARMACEUTICS, 2023, 15 (02)