Less is More: Supporting Developers in Vulnerability Detection during Code Review

被引:19
作者
Braz, Larissa [1 ]
Aeberhard, Christian [1 ]
Calikli, Gul [2 ]
Bacchelli, Alberto [1 ]
机构
[1] Univ Zurich, Zurich, Switzerland
[2] Univ Glasgow, Glasgow, Lanark, Scotland
来源
2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022) | 2022年
基金
瑞士国家科学基金会;
关键词
code review; security vulnerability; checklist; mental attitude; USABLE SECURITY; SOFTWARE; INSPECTIONS; CHECKLIST; PROGRAM;
D O I
10.1145/3510003.3511560
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Reviewing source code from a security perspective has proven to be a difficult task. Indeed, previous research has shown that developers often miss even popular and easy-to-detect vulnerabilities during code review. Initial evidence suggests that a significant cause may lie in the reviewers' mental attitude and common practices. In this study, we investigate whether and how explicitly asking developers to focus on security during a code review affects the detection of vulnerabilities. Furthermore, we evaluate the effect of providing a security checklist to guide the security review. To this aim, we conduct an online experiment with 150 participants, of which 71% report to have three or more years of professional development experience. Our results show that simply asking reviewers to focus on security during the code review increases eight times the probability of vulnerability detection. The presence of a security checklist does not significantly improve the outcome further, even when the checklist is tailored to the change under review and the existing vulnerabilities in the change. These results provide evidence supporting the mental attitude hypothesis and call for further work on security checklists' effectiveness and design.
引用
收藏
页码:1317 / 1329
页数:13
相关论文
共 91 条
[1]  
Ackerman A. F., 1984, Software Validation, Inspection - Testing - Verification - Alternatives. Proceedings of the Symposium, P13
[2]   SOFTWARE INSPECTIONS - AN EFFECTIVE VERIFICATION PROCESS [J].
ACKERMAN, AF ;
BUCHWALD, LS ;
LEWSKI, FH .
IEEE SOFTWARE, 1989, 6 (03) :31-36
[3]  
Akinola O S., 2009, An Empirical Comparative Study of Checklist based and Ad Hoc Code Reading Techniques in a Distributed Groupware Environment
[4]  
Alam M., 2010, INT J SOFTWARE ENG I, V3, P53
[5]  
[Anonymous], 2017, OWASP Top Ten
[6]  
[Anonymous], 2020, CWE TOP 25 MOST DANG
[7]  
[Anonymous], 2020, 2020 Mapping the DevSecOps Landscape
[8]  
[Anonymous], 2000, INTERNET SECURITY GL
[9]  
Assal H, 2018, PROCEEDINGS OF THE FOURTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, P281
[10]  
Ayewah N., 2008, DEFECTS 08, P1, DOI DOI 10.1145/1390817.1390819