Understanding vulnerabilities in software supply chains

被引:0
|
作者
Shen, Yijun [1 ]
Gao, Xiang [1 ,2 ]
Sun, Hailong [1 ,2 ]
Guo, Yu [1 ]
机构
[1] Beihang Univ, State Key Lab Complex & Crit Software Environm SKL, Beijing, Peoples R China
[2] Beihang Univ, Hangzhou Innovat Inst, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability; Software supply chain; Vulnerability source; Vulnerability propagation; Vulnerability localization; Vulnerability repair; BUG; CHALLENGES;
D O I
10.1007/s10664-024-10581-2
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
ContextDue to the dependency relations among software, vulnerabilities in software supply chains (SSC) may cause more serious security threats than independent software systems. This poses new challenges for ensuring software security including the spread of risks and the increase in maintenance costs.ObjectiveTo address the challenges, there needs a deep understanding of how a vulnerability is in SSC in terms of vulnerability source, propagation, localization, and repair. However, no studies have been conducted specifically for this purpose.MethodTo fill this gap, we provide an experience study of real-world vulnerability characteristics in the context of SSCs. Specifically, we examine the vulnerability source first and further study the fine-grained vulnerability propagation, localization, and repair of libraries and their corresponding client programs.ResultsThe key findings are summarized as follows: a) 99% of vulnerabilities in client programs are caused by their dependencies, and 81.26% of SSC vulnerabilities detected by package-level analysis are false positives; b) for vulnerability localization, the vulnerability database does not have enough information to help direct localization, but the vulnerability descriptions in the open-source vulnerability database provide much important information for indirect localization. c) client developers deal with vulnerable dependencies in many ways including upgrading dependencies, modifying client code, and deleting relevant code or vulnerable dependencies.ConclusionsBased on these observations, we make suggestions for future research in this direction: a) when testing important client programs, vulnerability detection tools should pay attention to both client code and the dependent libraries; b) localizing vulnerability based on vulnerability descriptions is not straightforward, hence a proper combination of program analysis and description analysis is expected to improve localization accuracy; c) there can be various strategies for dealing with vulnerable libraries, and automating the enforcement of those strategies will be expected.
引用
收藏
页数:38
相关论文
共 50 条
  • [1] Analysis of vulnerabilities in maritime supply chains
    Liu, Honglu
    Tian, Zhihong
    Huang, Anqiang
    Yang, Zaili
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 169 : 475 - 484
  • [2] Software Supply Chains
    Murphy, Gail C.
    2015 ACM/IEEE 18TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS), 2015, : 2 - 2
  • [3] Software Supply Chains
    Defranco J.F.
    Kshetri N.
    Computer, 2022, 55 (10): : 16 - 17
  • [4] Reducing Vulnerabilities in Upstream and Downstream Supply Chains
    Shelley, Suzanne
    Pharmaceutical Technology, 2023, 47 (06) : 36 - 38
  • [5] Understanding Service Supply Chains
    Sampson, Scott E.
    ICOSCM 2009 - PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON OPERATIONS AND SUPPLY CHAIN MANAGEMENT, 2009, 3 : 805 - 806
  • [6] Risk Explorer for Software Supply Chains Understanding the Attack Surface of Open-Source based Software Development
    Ladisa, Piergiorgio
    Plate, Henrik
    Martinez, Matias
    Barais, Olivier
    Ponta, Serena Elisa
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SOFTWARE SUPPLY CHAIN OFFENSIVE RESEARCH AND ECOSYSTEM DEFENSES, SCORED 2022, 2022, : 35 - 36
  • [7] Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions
    Anwar, Afsah
    Khormali, Aminollah
    Nyang, DaeHun
    Mohaisen, Aziz
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 377 - 395
  • [8] Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions
    Anwar, Afsah
    Khormali, Aminollah
    Mohaisen, Aziz
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 793 - 795
  • [9] Understanding Software Security Vulnerabilities in Cloud Server Systems
    Tunde-Onadele, Olufogorehan
    Lin, Yuhang
    Gu, Xiaohui
    He, Jingzhu
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), 2022, : 245 - 252
  • [10] Understanding accountability in algorithmic supply chains
    Cobbe, Jennifer
    Veale, Michael
    Singh, Jatinder
    PROCEEDINGS OF THE 6TH ACM CONFERENCE ON FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY, FACCT 2023, 2023, : 1186 - 1197