Advisory: Vulnerability analysis in software development project dependencies

被引:2
|
作者
Marquez, German [1 ]
Galindo, Jose A. [1 ]
Varela-Vaca, Angel Jesus [1 ]
Gomez Lopez, Maria Teresa [1 ]
Benavides, David [1 ]
机构
[1] Univ Seville, Dept Comp Languages & Syst, Seville, Spain
来源
26TH ACM INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, SPLC 2022, VOL B | 2022年
关键词
Software Project; Library; Dependency; Vulnerability; CVE; Security; Verification; Risk; Impact;
D O I
10.1145/3503229.3547058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security has become a crucial factor in the development of software systems. The number of dependencies in software systems is becoming a source of countless bugs and vulnerabilities. In the past, the product line community has proposed several techniques and mechanisms to cope with the problems that arise when dealing with variability and dependency management in such systems. In this paper, we present Advisory, a solution that allows automated dependency analysis for vulnerabilities within software projects based on techniques from the product line community. Advisory first inspects software dependencies, then generates a dependency graph, to which security information about vulnerabilities is attributed and translated into a formal model, in this case, based on SMT. Finally, Advisory provides a set of analysis and reasoning operations on these models that allow extracting helpful information about the location of vulnerabilities of the project configuration space, as well as details for advising on the security risk of these projects and their possible configurations.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [1] Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT)
    Marquez, A. German
    Varela-Vaca, Angel Jesus
    Lopez, Maria Teresa Goemez
    Galindo, Jose A.
    Benavides, David
    COMPUTERS & SECURITY, 2024, 139
  • [2] Determinants of Software Vulnerability Disclosure Timing
    Sen, Ravi
    Choobineh, Joobin
    Kumar, Subodha
    PRODUCTION AND OPERATIONS MANAGEMENT, 2020, 29 (11) : 2532 - 2552
  • [3] A case study on software vulnerability coordination
    Ruohonen, Jukka
    Rauti, Sampsa
    Hyrynsalmi, Sami
    Leppanen, Ville
    INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 103 : 239 - 257
  • [4] Quantified Approach to Crisis Detection of the Software Development Project
    Sebek, Martin
    Pergl, Robert
    AGRARIAN PERSPECTIVES XVIII, VOLS 1 AND 2, 2009, : 653 - 656
  • [5] MDM-BASED SOFTWARE MODULARIZATION BY ANALYSING INTER-PROJECT DEPENDENCIES
    Mirson, Alexander
    Skrypnyuk, Oleg
    Elezi, Fatos
    Lindemann, Udo
    INVEST ON VISUALIZATION, 2011, : 143 - +
  • [6] A novel approach to evaluate software vulnerability prioritization
    Huang, Chien-Cheng
    Lin, Feng-Yu
    Lin, Frank Yeong-Sung
    Sun, Yeali S.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (11) : 2822 - 2840
  • [7] Vulnerability analysis of GPS receiver software
    Gonzalez, G. Mori
    Petrunin, I.
    Zbikowski, R.
    Voutsis, K.
    Moreno, R. Verdeguer
    2019 INTERNATIONAL CONFERENCE ON LOCALIZATION AND GNSS (ICL-GNSS), 2019,
  • [8] Automating Vulnerability Management in the Software Development Lifecycle
    Franca, Horacio L.
    Teixeira, Cesar
    laranjeiro, Nuno
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 188 - 190
  • [9] Analysis of software vulnerability classification based on different technical parameters
    Garg, Shivi
    Singh, R. K.
    Mohapatra, A. K.
    INFORMATION SECURITY JOURNAL, 2019, 28 (1-2): : 1 - 19
  • [10] A Large Scale Exploratory Analysis of Software Vulnerability Life Cycles
    Shahzad, Muhammad
    Shafiq, Muhammad Zubair
    Liu, Alex X.
    2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 771 - 781