Investigation of the Software Code Vulnerabilities' Impact on the Popularity of Open Source Software Projects

被引:0
作者
Singh, Madanjit [1 ]
Saini, Munish [2 ]
Kaur, Manevpreet [1 ]
机构
[1] Guru Nanak Dev Univ, Dept Comp Sci, Amritsar, Punjab, India
[2] Guru Nanak Dev Univ, Dept Comp Engn & Technol, Amritsar, Punjab, India
关键词
Code Scanning Tools; Hits; Open Source Software (OSS); Popularity Metrics; Software Quality; Vulnerability;
D O I
10.4018/JITR.2021070104
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper has statically investigated the source code of open source software (OSS) projects to uncover the presence of vulnerabilities in the code. The conducted research emphasizes that the presence of vulnerabilities has adverse effects on the overall software quality. The authors found the increasing trends in the vulnerabilities as the lines of code (LOC) increases during the software evolution. This signifies the fact that the addition of new features or change requests into the OSS project may cause an increase in vulnerability. Further, the relation between software vulnerabilities and popularity is also examined. This research does not find the existence of any relationship among software vulnerabilities and popularity. This research will provide significant implications to the developers and project managers to better understand the present state of the software.
引用
收藏
页码:58 / 69
页数:12
相关论文
共 19 条
[1]  
Aggarwal A, 2006, P INT COMP SOFTW APP, P343
[2]  
Ball T., 2006, Operating Systems Review, V40, P73, DOI 10.1145/1218063.1217943
[3]  
Bishop M., 2003, TESTING C PROGRAMS B
[4]  
Brumley D, 2007, RICH AUTOMATICALLY P
[5]  
CHEN YF, 1994, PROC INT CONF SOFTW, P211
[6]  
DeKok A, 2013, PSCAN LTD PROBLEM SC
[7]   Improving security using extensible lightweight static analysis [J].
Evans, D ;
Larochelle, D .
IEEE SOFTWARE, 2002, 19 (01) :42-+
[8]  
Fatima Anum, 2018, 2018 15th International Bhurban Conference on Applied Sciences and Technology (IBCAST). Proceedings, P465, DOI 10.1109/IBCAST.2018.8312265
[9]  
Kuang C, 2006, P 5 WSEAS INT C INF
[10]  
Larochelle D, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, P177