Advisory: Vulnerability analysis in software development project dependencies

被引:2
|
作者
Marquez, German [1 ]
Galindo, Jose A. [1 ]
Varela-Vaca, Angel Jesus [1 ]
Gomez Lopez, Maria Teresa [1 ]
Benavides, David [1 ]
机构
[1] Univ Seville, Dept Comp Languages & Syst, Seville, Spain
来源
26TH ACM INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, SPLC 2022, VOL B | 2022年
关键词
Software Project; Library; Dependency; Vulnerability; CVE; Security; Verification; Risk; Impact;
D O I
10.1145/3503229.3547058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security has become a crucial factor in the development of software systems. The number of dependencies in software systems is becoming a source of countless bugs and vulnerabilities. In the past, the product line community has proposed several techniques and mechanisms to cope with the problems that arise when dealing with variability and dependency management in such systems. In this paper, we present Advisory, a solution that allows automated dependency analysis for vulnerabilities within software projects based on techniques from the product line community. Advisory first inspects software dependencies, then generates a dependency graph, to which security information about vulnerabilities is attributed and translated into a formal model, in this case, based on SMT. Finally, Advisory provides a set of analysis and reasoning operations on these models that allow extracting helpful information about the location of vulnerabilities of the project configuration space, as well as details for advising on the security risk of these projects and their possible configurations.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [41] Research of the Project Collaboration Development Model Based on the Workflow Software
    Jiang, Kun
    2013 3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES AND SOCIETY (ICSSS 2013), PT 3, 2013, 34 : 72 - 76
  • [42] Prediction of IS Project Escalation Based on Software Development Risk Management
    Kim, Eun
    Park, Yongtae
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2007, 6 (02) : 153 - 163
  • [43] Large Scale Characterization of Software Vulnerability Life Cycles
    Shahzad, Muhammad
    Shafiq, M. Zubair
    Liu, Alex X.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 730 - 744
  • [44] Vulnerability of the Day: Concrete Demonstrations for Software Engineering Undergraduates
    Meneely, Andrew
    Lucidi, Samuel
    PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 1154 - 1157
  • [45] An Automated Vulnerability Detection and Remediation Method for Software Security
    Jurn, Jeesoo
    Kim, Taeeun
    Kim, Hwankuk
    SUSTAINABILITY, 2018, 10 (05)
  • [46] Analysis on Chaotic Characteristics of Software Project Risk System
    Qu, Ying
    Wang, He
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (02): : 49 - 59
  • [47] Sensitivity Analysis of Software Project Risk Assessment Model
    Zhou, Chi
    Wang, Yingchun
    Huang, Huixia
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 569 - 572
  • [48] RESPONSIBLE RISK ANALYSIS FOR SOFTWARE DEVELOPMENT: CREATING THE SOFTWARE DEVELOPMENT IMPACT STATEMENT
    Gotterbarn, Don
    Rogerson, Simon
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2005, 15 : 730 - 750
  • [49] Software quality and IS project performance improvements from software development process maturity and IS implementation strategies
    Subramanian, Girish H.
    Jiang, James J.
    Klein, Gary
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (04) : 616 - 627
  • [50] Food security vulnerability due to trade dependencies on Russia and Ukraine
    Hellegers, Petra
    FOOD SECURITY, 2022, 14 (06) : 1503 - 1510