Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities

被引:0
作者
Sadeghi, Alireza [1 ]
Esfahani, Naeem [1 ]
Malek, Sam [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
来源
FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2014 | 2014年 / 8411卷
基金
美国国家科学基金会;
关键词
Security Vulnerability; Mining Software Repositories; Software Analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security has become the Achilles' heel of most modern software systems. Techniques ranging from the manual inspection to automated static and dynamic analyses are commonly employed to identify security vulnerabilities prior to the release of the software. However, these techniques are time consuming and cannot keep up with the complexity of ever-growing software repositories (e.g., Google Play and Apple App Store). In this paper, we aim to improve the status quo and increase the efficiency of static analysis by mining relevant information from vulnerabilities found in the categorized software repositories. The approach relies on the fact that many modern software systems are developed using rich application development frameworks (ADF), allowing us to raise the level of abstraction for detecting vulnerabilities and thereby making it possible to classify the types of vulnerabilities that are encountered in a given category of application. We used open-source software repositories comprising more than 7 million lines of code to demonstrate how our approach can improve the efficiency of static analysis, and in turn, vulnerability detection.
引用
收藏
页码:155 / 169
页数:15
相关论文
共 26 条
[1]  
Android, OFF BLOG O
[2]  
[Anonymous], 2011, USENIX SECURITY S
[3]  
[Anonymous], 2012, EMPIR SOFTW ENG
[4]  
Bertsekas D., 2008, INTRO PROBABILITY
[5]   Source code analysis: A road map [J].
Binkley, David .
FoSE 2007: Future of Software Engineering, 2007, :104-119
[6]  
Eclipse, EC TEST PERF TOOLS P
[7]   Understanding Android Security [J].
Enck, William ;
Ongtang, Machigair ;
McDaniel, Patrick .
IEEE SECURITY & PRIVACY, 2009, 7 (01) :50-57
[8]  
Gartner Inc, 2011, GARTN REV TOP PRED I
[9]  
Gilbert Peter., 2011, Proceedings of the International Workshop on Mobile Cloud Computing and Services (MCS), P21, DOI DOI 10.1145/1999732.1999740
[10]   Finding bugs is easy [J].
Hovemeyer, D ;
Pugh, W .
ACM SIGPLAN NOTICES, 2004, 39 (12) :92-106