Advisory: Vulnerability analysis in software development project dependencies

被引:2
|
作者
Marquez, German [1 ]
Galindo, Jose A. [1 ]
Varela-Vaca, Angel Jesus [1 ]
Gomez Lopez, Maria Teresa [1 ]
Benavides, David [1 ]
机构
[1] Univ Seville, Dept Comp Languages & Syst, Seville, Spain
来源
26TH ACM INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, SPLC 2022, VOL B | 2022年
关键词
Software Project; Library; Dependency; Vulnerability; CVE; Security; Verification; Risk; Impact;
D O I
10.1145/3503229.3547058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security has become a crucial factor in the development of software systems. The number of dependencies in software systems is becoming a source of countless bugs and vulnerabilities. In the past, the product line community has proposed several techniques and mechanisms to cope with the problems that arise when dealing with variability and dependency management in such systems. In this paper, we present Advisory, a solution that allows automated dependency analysis for vulnerabilities within software projects based on techniques from the product line community. Advisory first inspects software dependencies, then generates a dependency graph, to which security information about vulnerabilities is attributed and translated into a formal model, in this case, based on SMT. Finally, Advisory provides a set of analysis and reasoning operations on these models that allow extracting helpful information about the location of vulnerabilities of the project configuration space, as well as details for advising on the security risk of these projects and their possible configurations.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [21] Generating Precise Dependencies for Large Software
    Wang, Pei
    Yang, Jinqiu
    Tan, Lin
    Kroeger, Robert
    Morgenthaler, J. David
    2013 4TH INTERNATIONAL WORKSHOP ON MANAGING TECHNICAL DEBT (MTD), 2013, : 47 - 50
  • [22] Towards Automated Updates of Software Dependencies
    Jayasuriya, Dhanushka
    COMPANION PROCEEDINGS OF THE 2022 ACM SIGPLAN INTERNATIONAL CONFERENCE ON SYSTEMS, PROGRAMMING, LANGUAGES, AND APPLICATIONS: SOFTWARE FOR HUMANITY, SPLASH COMPANION 2022, 2022, : 29 - 33
  • [23] Customizing software development processes based on the project properties
    Baratimehr, Kazem
    Shams, Fereidoon
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1091 - +
  • [24] Development of Mass Spectrometer Software Project Based on CMMI
    Wang, Wenjin
    Lu, Xiaochuan
    Jia, Ribo
    Li, Fang
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2508 - 2511
  • [25] TROUBLE COMMUNICATION MODEL IN A SOFTWARE-DEVELOPMENT PROJECT
    NAKATANI, M
    NISHIDA, S
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1992, E75A (02) : 196 - 206
  • [26] A new risk evaluation method for software development project
    Xu, Lin
    Deng, Mingrong
    ISMOT'07: Proceedings of the Fifth International Symposium on Management of Technology, Vols 1 and 2: MANAGING TOTAL INNOVATION AND OPEN INNOVATION IN THE 21ST CENTURY, 2007, : 874 - 878
  • [27] Handling project dependencies in portfolio management
    Bilgin, Gozde
    Eken, Gorkem
    Ozyurt, Beste
    Dikmen, Irem
    Birgonul, M. Talat
    Ozorhon, Beliz
    CENTERIS 2017 - INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS / PROJMAN 2017 - INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT / HCIST 2017 - INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERI, 2017, 121 : 356 - 363
  • [28] How project strategy is used in project management: Cases of new product development and software development projects
    Patanakul, Peerasit
    Shenhar, Aaron J.
    Milosevic, Dragan Z.
    JOURNAL OF ENGINEERING AND TECHNOLOGY MANAGEMENT, 2012, 29 (03) : 391 - 414
  • [29] Software security; A vulnerability-activity revisit
    Hadavi, M. A.
    Sangchi, H. M.
    Hamishagi, V. S.
    Shirazi, H.
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 866 - 872
  • [30] Software Development Project Risk: A Second Order Factor Model Validated in the Indian Context
    Thomas, Sam
    Bhasi, M.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 2012, 3 (04) : 41 - 55