Understanding Software Vulnerabilities Related to Architectural Security Tactics An Empirical Investigation of Chromium, PHP and Thunderbird

被引:19
|
作者
Santos, Joanna C. S. [1 ]
Peruma, Anthony [1 ]
Mirakhorli, Mehdi [1 ]
Galster, Matthias [2 ]
Vidal, Jairo Veloz [1 ]
Sejfia, Adriana [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
[2] Univ Canterbury, Christchurch, New Zealand
基金
美国国家科学基金会;
关键词
D O I
10.1109/ICSA.2017.39
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To satisfy security requirements, software architects often adopt security tactics. These architectural tactics provide mechanisms for resisting, detecting, reacting to and recovering from attacks. Consequently, flaws in the implementation of security tactics or their deterioration during software evolution and maintenance can introduce severe vulnerabilities that could be exploited by attackers. However, we currently lack an in-depth understanding of the types and impact of vulnerabilities related to security tactics. Therefore, in this paper, we conduct a first-of-itskind in-depth case study involving three large-scale open-source systems. We investigate the most common types of vulnerabilities associated with security tactics, how frequently they may occur over time, and how fixing them differs from fixing vulnerabilities that are not related to security tactics. Key findings are (i) most tactic-related vulnerabilities were related to the tactics "Validate Inputs" and "Authorize Actors", (ii) vulnerabilities related to tactics have a similar distribution over time and software releases as vulnerabilities that are not related to tactics, (iii) fixing tactic-related vulnerabilities is not necessarily more complex than fixing vulnerabilities that are not related to security tactics. This study highlights the importance of ensuring an appropriate implementation of security-related design decisions in code to avoid vulnerabilities rooted in the architecture.
引用
收藏
页码:69 / 78
页数:10
相关论文
共 16 条
  • [1] Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
    Anand, Priya
    Ryoo, Jungwoo
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [2] Architectural Security Weaknesses in Industrial Control Systems (ICS) An Empirical Study based on Disclosed Software Vulnerabilities
    Gonzalez, Danielle
    Alhenaki, Fawaz
    Mirakhorli, Mehdi
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA), 2019, : 31 - 40
  • [3] Understanding Software Security Vulnerabilities in Cloud Server Systems
    Tunde-Onadele, Olufogorehan
    Lin, Yuhang
    Gu, Xiaohui
    He, Jingzhu
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), 2022, : 245 - 252
  • [4] An Empirical Investigation of Security Vulnerabilities within Web Applications
    Abunadi, Ibrahim
    Alenezi, Mamdouh
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2016, 22 (04) : 537 - 551
  • [5] Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries
    Harzevili, Nima Shiri
    Shin, Jiho
    Wang, Junjie
    Wang, Song
    Nagappan, Nachiappan
    [J]. 2023 IEEE/ACM 20TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2023, : 27 - 38
  • [6] Towards Understanding Internet of Things Security and its Empirical Vulnerabilities: A Survey
    El Bouanani, Salim
    Achbarou, Omar
    Kiram, My Ahmed
    Outchakoucht, Aissam
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (10) : 337 - 345
  • [7] Identifying and Understanding Architectural Risks in Software Evolution: An Empirical Study
    Slyngstad, Odd Petter Nord
    Li, Jingyue
    Conradi, Reidar
    Babar, M. Ali
    [J]. PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROCEEDINGS, 2008, 5089 : 400 - +
  • [8] Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities
    Gkortzis, Antonios
    Feitosa, Daniel
    Spinellis, Diomidis
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2021, 172
  • [9] Analyzing Software Security-related Size and its Relationship with Vulnerabilities in OSS
    Venson, Elaine
    Lam, Ting Fung
    Clark, Bradford
    Boehm, Barry
    [J]. 2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 956 - 965
  • [10] Machine Learning to Combine Static Analysis Alerts with Software Metrics to Detect Security Vulnerabilities: An Empirical Study
    Pereira, Jose D'Abruzzo
    Campos, Joao R.
    Vieira, Marco
    [J]. 2021 17TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2021), 2021, : 1 - 8