Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering 2020
DOI: 10.1145/3377811.3380923
|View full text |Cite
|
Sign up to set email alerts
|

A large-scale empirical study on vulnerability distribution within projects and the lessons learned

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(23 citation statements)
references
References 36 publications
0
23
0
Order By: Relevance
“…We excluded databases from the security community (e.g., CVE List and NVD) because i) they do not have patches structurally included but have patches potentially hidden in references, and ii) they contain vulnerabilities that go beyond OSS vulnerabilities. We also excluded databases from academia (e.g., [29], [40], [41], [44], [48], [51], [55], [61]) because i) they mostly only cover specific ecosystems or projects and ii) they lack continued maintenance and become out of date after publication. Thus, we restricted our selection to industrial databases.…”
Section: Data Preparationmentioning
confidence: 99%
“…We excluded databases from the security community (e.g., CVE List and NVD) because i) they do not have patches structurally included but have patches potentially hidden in references, and ii) they contain vulnerabilities that go beyond OSS vulnerabilities. We also excluded databases from academia (e.g., [29], [40], [41], [44], [48], [51], [55], [61]) because i) they mostly only cover specific ecosystems or projects and ii) they lack continued maintenance and become out of date after publication. Thus, we restricted our selection to industrial databases.…”
Section: Data Preparationmentioning
confidence: 99%
“…In particular, a few available datasets assist researchers to mine repositories with the goal to better understand software vulnerabilities [7,10,13,18,19]. Investigating characteristics of vulnerabilities for open-source software can provide findings that should lead to the development of more secure systems [10].…”
Section: Background and Related Workmentioning
confidence: 99%
“…From such databases, researchers can crawl their records to gather useful information such as the CVE identification, vulnerability classification, publish date and etc. Then, they can select CVE or NVD records that have reference links of publicly GitHub repositories [7,13]. These links lead to actual code commits containing the addition of a known vulnerability to a given project stored on GitHub.…”
Section: Datasets For Software Vulnerabilitiesmentioning
confidence: 99%
See 2 more Smart Citations