Understanding vulnerabilities in software supply chains

被引:1
作者
Shen, Yijun [1 ]
Gao, Xiang [1 ,2 ]
Sun, Hailong [1 ,2 ]
Guo, Yu [1 ]
机构
[1] Beihang Univ, State Key Lab Complex & Crit Software Environm SKL, Beijing, Peoples R China
[2] Beihang Univ, Hangzhou Innovat Inst, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability; Software supply chain; Vulnerability source; Vulnerability propagation; Vulnerability localization; Vulnerability repair; BUG; CHALLENGES;
D O I
10.1007/s10664-024-10581-2
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
ContextDue to the dependency relations among software, vulnerabilities in software supply chains (SSC) may cause more serious security threats than independent software systems. This poses new challenges for ensuring software security including the spread of risks and the increase in maintenance costs.ObjectiveTo address the challenges, there needs a deep understanding of how a vulnerability is in SSC in terms of vulnerability source, propagation, localization, and repair. However, no studies have been conducted specifically for this purpose.MethodTo fill this gap, we provide an experience study of real-world vulnerability characteristics in the context of SSCs. Specifically, we examine the vulnerability source first and further study the fine-grained vulnerability propagation, localization, and repair of libraries and their corresponding client programs.ResultsThe key findings are summarized as follows: a) 99% of vulnerabilities in client programs are caused by their dependencies, and 81.26% of SSC vulnerabilities detected by package-level analysis are false positives; b) for vulnerability localization, the vulnerability database does not have enough information to help direct localization, but the vulnerability descriptions in the open-source vulnerability database provide much important information for indirect localization. c) client developers deal with vulnerable dependencies in many ways including upgrading dependencies, modifying client code, and deleting relevant code or vulnerable dependencies.ConclusionsBased on these observations, we make suggestions for future research in this direction: a) when testing important client programs, vulnerability detection tools should pay attention to both client code and the dependent libraries; b) localizing vulnerability based on vulnerability descriptions is not straightforward, hence a proper combination of program analysis and description analysis is expected to improve localization accuracy; c) there can be various strategies for dealing with vulnerable libraries, and automating the enforcement of those strategies will be expected.
引用
收藏
页数:38
相关论文
共 50 条
[21]   A hybrid scoring system for prioritization of software vulnerabilities [J].
Sharma, Abhishek ;
Sabharwal, Sangeeta ;
Nagpal, Sushama .
COMPUTERS & SECURITY, 2023, 129
[22]   Vulnerabilities and Threats in Cloud Software Engineering Security [J].
Yu, Weider D. ;
Runiassy, Maryam ;
Yin, Yijun .
INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 :1822-1831
[23]   Organizing the monitoring of vulnerabilities in the CPCS software and hardware [J].
Khozyainov, Tatyana, V ;
Shechev, Ivan A. ;
Kobzev, Dmitry A. ;
Bengart, Zakhar S. ;
Kutlubaeva, Elvina G. .
NAUKA I TEHNOLOGII TRUBOPROVODNOGO TRANSPORTA NEFTI I NEFTEPRODUKTOV-SCIENCE & TECHNOLOGIES-OIL AND OIL PRODUCTS PIPELINE TRANSPORTATION, 2019, 9 (04) :458-466
[24]   Understanding the Enablers of Blockchain Technology Adoption in Sustainable Supply Chains: A DEMATEL-Based Analysis [J].
Agi, Maher A. N. .
IFAC PAPERSONLINE, 2022, 55 (10) :1962-1967
[25]   Understanding the Challenges in Detecting Vulnerabilities of Rust Applications [J].
Stephens, Diane B. ;
Aldoshan, Kawkab ;
Khandaker, Mustakimur Rahman .
2024 IEEE SECURE DEVELOPMENT CONFERENCE, SECDEV 2024, 2024, :54-63
[26]   A framework for understanding old-age vulnerabilities [J].
Schröder-Butterfill, E ;
Marianti, R .
AGEING & SOCIETY, 2006, 26 :9-35
[27]   Investigation of the Software Code Vulnerabilities' Impact on the Popularity of Open Source Software Projects [J].
Singh, Madanjit ;
Saini, Munish ;
Kaur, Manevpreet .
JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2021, 14 (03) :58-69
[28]   Model-Based Evaluation of Vulnerabilities in Software Systems [J].
Kenner, Andy .
24TH ACM SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, SPLC 2020, VOL B, 2020, :112-119
[29]   Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems [J].
Anand, Priya ;
Ryoo, Jungwoo .
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
[30]   Modeling Software Patch Management Based on Vulnerabilities Discovered [J].
Anand, Adarsh ;
Bhatt, Navneet ;
Aggrawal, Deepti .
INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2020, 27 (02)