Advisory: Vulnerability analysis in software development project dependencies

被引:2
|
作者
Marquez, German [1 ]
Galindo, Jose A. [1 ]
Varela-Vaca, Angel Jesus [1 ]
Gomez Lopez, Maria Teresa [1 ]
Benavides, David [1 ]
机构
[1] Univ Seville, Dept Comp Languages & Syst, Seville, Spain
来源
26TH ACM INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, SPLC 2022, VOL B | 2022年
关键词
Software Project; Library; Dependency; Vulnerability; CVE; Security; Verification; Risk; Impact;
D O I
10.1145/3503229.3547058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security has become a crucial factor in the development of software systems. The number of dependencies in software systems is becoming a source of countless bugs and vulnerabilities. In the past, the product line community has proposed several techniques and mechanisms to cope with the problems that arise when dealing with variability and dependency management in such systems. In this paper, we present Advisory, a solution that allows automated dependency analysis for vulnerabilities within software projects based on techniques from the product line community. Advisory first inspects software dependencies, then generates a dependency graph, to which security information about vulnerabilities is attributed and translated into a formal model, in this case, based on SMT. Finally, Advisory provides a set of analysis and reasoning operations on these models that allow extracting helpful information about the location of vulnerabilities of the project configuration space, as well as details for advising on the security risk of these projects and their possible configurations.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [31] A comparative analysis of several vulnerability concepts
    Hufschmidt, Gabi
    NATURAL HAZARDS, 2011, 58 (02) : 621 - 643
  • [32] Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis
    Kim, Seokmo
    Kim, R. Young Chul
    Park, Young B.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (03) : 777 - 793
  • [33] Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis
    Seokmo Kim
    R. Young Chul Kim
    Young B. Park
    Wireless Personal Communications, 2016, 89 : 777 - 793
  • [34] The effect of Bellwether analysis on software vulnerability severity prediction models
    Kudjo, Patrick Kwaku
    Chen, Jinfu
    Mensah, Solomon
    Amankwah, Richard
    Kudjo, Christopher
    SOFTWARE QUALITY JOURNAL, 2020, 28 (04) : 1413 - 1446
  • [35] An empirical analysis for software robustness vulnerability in terms of modularity quality
    Abadeh, Maryam Nooraei
    Mirzaie, Mansooreh
    SYSTEMS ENGINEERING, 2023, 26 (06) : 754 - 769
  • [36] A new approach to software vulnerability detection based on CPG analysis
    Do Xuan, Cho
    COGENT ENGINEERING, 2023, 10 (01):
  • [37] Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies
    Tang, MingJian
    Alazab, Mamoun
    Luo, Yuxiu
    IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 317 - 329
  • [38] Risk Analysis in Software Development
    Comstock, Craig
    Jiang, Zhizhong
    Naude, Peter
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, PTS I AND II: NEW ASPECTS OF APPLIED INFORMATICS AND COMMUNICATIONS, 2008, : 35 - 40
  • [39] Abstracting dependencies between software configuration items
    Gunter, CA
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (01) : 94 - 131
  • [40] A model of owner estimate cost for software development project in Indonesia
    Sholiq
    Subriadi, Apol Pribadi
    Muqtadiroh, Feby Artwodini
    Dewi, Renny Sari
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2019, 31 (10)