Understanding vulnerabilities in software supply chains

被引:1
作者
Shen, Yijun [1 ]
Gao, Xiang [1 ,2 ]
Sun, Hailong [1 ,2 ]
Guo, Yu [1 ]
机构
[1] Beihang Univ, State Key Lab Complex & Crit Software Environm SKL, Beijing, Peoples R China
[2] Beihang Univ, Hangzhou Innovat Inst, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability; Software supply chain; Vulnerability source; Vulnerability propagation; Vulnerability localization; Vulnerability repair; BUG; CHALLENGES;
D O I
10.1007/s10664-024-10581-2
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
ContextDue to the dependency relations among software, vulnerabilities in software supply chains (SSC) may cause more serious security threats than independent software systems. This poses new challenges for ensuring software security including the spread of risks and the increase in maintenance costs.ObjectiveTo address the challenges, there needs a deep understanding of how a vulnerability is in SSC in terms of vulnerability source, propagation, localization, and repair. However, no studies have been conducted specifically for this purpose.MethodTo fill this gap, we provide an experience study of real-world vulnerability characteristics in the context of SSCs. Specifically, we examine the vulnerability source first and further study the fine-grained vulnerability propagation, localization, and repair of libraries and their corresponding client programs.ResultsThe key findings are summarized as follows: a) 99% of vulnerabilities in client programs are caused by their dependencies, and 81.26% of SSC vulnerabilities detected by package-level analysis are false positives; b) for vulnerability localization, the vulnerability database does not have enough information to help direct localization, but the vulnerability descriptions in the open-source vulnerability database provide much important information for indirect localization. c) client developers deal with vulnerable dependencies in many ways including upgrading dependencies, modifying client code, and deleting relevant code or vulnerable dependencies.ConclusionsBased on these observations, we make suggestions for future research in this direction: a) when testing important client programs, vulnerability detection tools should pay attention to both client code and the dependent libraries; b) localizing vulnerability based on vulnerability descriptions is not straightforward, hence a proper combination of program analysis and description analysis is expected to improve localization accuracy; c) there can be various strategies for dealing with vulnerable libraries, and automating the enforcement of those strategies will be expected.
引用
收藏
页数:38
相关论文
共 50 条
[31]   'Vulnerability' at Work: Instrumental Vulnerabilities Among Software Professionals [J].
Ciccone, Vanessa .
SOCIOLOGICAL RESEARCH ONLINE, 2024, 29 (04) :881-897
[32]   Distributed AgriFood Supply Chains [J].
Pesanhane, Helio ;
Bezerra, Wesley R. ;
Koch, Fernando ;
Westphall, Carlos .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (03)
[33]   Vulnerabilities in IoT Devices with Software-Defined Radio [J].
Phan Duy Hung ;
Bui Trong Vinh .
2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, :664-668
[34]   The science of sustainable supply chains [J].
O'Rourke, Dara .
SCIENCE, 2014, 344 (6188) :1124-1127
[35]   Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities [J].
Sultana, Kazi Zakia ;
Codabux, Zadia ;
Williams, Byron .
2020 27TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2020), 2020, :31-40
[36]   Detecting Software Vulnerabilities in Android Using Static Analysis [J].
Dhaya, R. ;
Poongodi, M. .
2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, :915-918
[37]   The Life Cycle of Vulnerabilities in the Representations of Software for Telecommunication Devices [J].
Buinevich, Mikhail ;
Izrailov, Konstantin ;
Vladyko, Andrei .
2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, :430-435
[38]   Monitoring Software Vulnerabilities through Social Networks Analysis [J].
Trabelsi, Slim ;
Plate, Henrik ;
Abida, Amine ;
Ben Aoun, M. Marouane ;
Zouaoui, Anis ;
Missaoui, Chedy ;
Gharbi, Sofien ;
Ayari, Alaeddine .
2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, :236-242
[39]   Redesigning traditional linear supply chains into circular supply chains-A study into its challenges [J].
Roy, Tarun ;
Garza-Reyes, Jose Arturo ;
Kumar, Vikas ;
Kumar, Anil ;
Agrawal, Rohit .
SUSTAINABLE PRODUCTION AND CONSUMPTION, 2022, 31 :113-126
[40]   Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector [J].
Aarland, Mari ;
Gjosaeter, Terje .
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, :326-333