Sais: Self-Adaptive Identification of Security Bug Reports

被引:3
|
作者
Mostafa, Shaikh [1 ]
Findley, Bridgette [1 ]
Meng, Na [2 ]
Wang, Xiaoyin [1 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[2] Virginia Tech, Blacksburg, VA 24061 USA
关键词
Computer bugs; Security; Training; Data models; Databases; Semisupervised learning; Software; Security bug reports; self learning; bug triaging; TEXT CLASSIFICATION;
D O I
10.1109/TDSC.2019.2939132
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Among various bug reports (BRs), security bug reports (SBRs) are unique because they require immediate concealment and fixes. When SBRs are not identified in time, attackers can exploit the vulnerabilities. Prior work identifies SBRs via text mining, which requires a predefined keyword list and trains a classifier with known SBRs and non-security bug reports (NSBRs). The former approach is not reliable, because (1) as the contexts of security vulnerabilities and terminology of SBRs change over time, the predefined list will become out-dated; and (2) users may have insufficient SBRs for training. We introduce a semi-supervised learning-based approach, Sais, to adaptively and reliably identify SBRs. Given a project's BRs containing some labeled SBRs, many more NSBRs, and unlabeled BRs, Sais iteratively mines keywords, trains a classifier based on the keywords from the labeled data, classifies unlabeled BRs, and augments its training data with the newly labeled BRs. Our evaluation shows that Sais is useful for identifying SBRs.
引用
收藏
页码:1779 / 1792
页数:14
相关论文
共 50 条
  • [31] Self-adaptive photochromism
    Sun, Fanxi
    Gao, Ang
    Yan, Boyun
    Zhang, Jing
    Wang, Xiangru
    Zhang, Hanjun
    Dai, Dacheng
    Zheng, Yonghao
    Deng, Xu
    Wei, Chen
    Wang, Dongsheng
    Science Advances, 2024, 10 (45)
  • [32] Self-adaptive protocols
    Tarnay, K
    SELF-ADAPTIVE SOFTWARE: APPLICATIONS, 2001, 2614 : 106 - 112
  • [33] The research on dynamic self-adaptive network security model based on mobile agent
    Jiang, T
    Liu, JR
    Qin, Y
    36TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 134 - 139
  • [34] Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
    Shaltout, Nawal
    Abd El-Latif, Ahmed A.
    Al-Adrousy, Waleed M.
    Elmougy, Samir
    IEEE ACCESS, 2023, 11 : 2303 - 2317
  • [35] Identification of Security related Bug Reports via Text Mining using Supervised and Unsupervised Classification
    Goseva-Popstojanova, Katerina
    Tyo, Jacob
    2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 344 - 355
  • [36] A self-adaptive graph-based clustering method with noise identification
    Lin Li
    Xiang Chen
    Chengyun Song
    Pattern Analysis and Applications, 2023, 26 (3) : 907 - 916
  • [37] A self-adaptive graph-based clustering method with noise identification
    Li, Lin
    Chen, Xiang
    Song, Chengyun
    PATTERN ANALYSIS AND APPLICATIONS, 2023, 26 (03) : 907 - 916
  • [38] On Model Parameters Identification and Fuzzy Self-adaptive Course Control for USV
    Fan Yunsheng
    Sun Xiaojie
    Wang Guofeng
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 6332 - 6338
  • [39] System Identification Using Self-Adaptive Group Particle Swarm Optimization
    Lin, Chun-Hui
    Lee, Chin-Ling
    Lin, Cheng-Jian
    2018 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2018), 2018, : 310 - 313
  • [40] Self-adaptive Feature Fusion Method for Improving LBP for Face Identification
    Wei, Xin
    Wang, Hui
    Wan, Huan
    Sctoney, Bryan
    COMPUTER VISION SYSTEMS, ICVS 2017, 2017, 10528 : 373 - 383