2022
DOI: 10.24138/jcomss-2021-0124
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Vulnerability Identifiers in Code Comments: Source, Purpose, and Severity

Abstract: Software vulnerability is one of the weaknesses in computer security that challenges developers to rectify. Software maintainers rely on code comments to maintain their source code, including fixing vulnerability issues. To facilitate understanding the security issues in the related code, vulnerability identifiers are commonly included in code comments. However, not all vulnerability-related code comments describe clearly the purposes of the inclusion of the identifiers. Based on this evidence, we investigate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…To answer RQ 1 , we conducted a qualitative analysis of statistically representative samples included in dataset D2. In order to identify the topics discussed by npm maintainers on Twitter, we manually analyzed the tweets related to npm ecosystem using thematic analysis similar to previous studies ( Hata et al, 2019 ; Nugroho et al, 2021 , 2022 ; Islam et al, 2023 ). This process consists of four steps: (1) building a schema to classify the tweets, (2) grouping the topics into coherent categories, (3) classifying the tweets manually based on the developed schema, (4) aggregating the results from analysis.…”
Section: Methodsmentioning
confidence: 99%
“…To answer RQ 1 , we conducted a qualitative analysis of statistically representative samples included in dataset D2. In order to identify the topics discussed by npm maintainers on Twitter, we manually analyzed the tweets related to npm ecosystem using thematic analysis similar to previous studies ( Hata et al, 2019 ; Nugroho et al, 2021 , 2022 ; Islam et al, 2023 ). This process consists of four steps: (1) building a schema to classify the tweets, (2) grouping the topics into coherent categories, (3) classifying the tweets manually based on the developed schema, (4) aggregating the results from analysis.…”
Section: Methodsmentioning
confidence: 99%
“…In order to discover the topics from tweets posted by the npm core developers, an open coding strategy was adopted similar to previous studies 14,21,27,28 . The open coding process consists of three steps.…”
Section: Topic Of Tweet (Rq 1 ): What Are the Main Topics Of Interest...mentioning
confidence: 99%
“…Cowan named it the "vulnerability of the decade" (1988)(1989)(1990)(1991)(1992)(1993)(1994)(1995)(1996)(1997)(1998), because it was the leading cause of security breaches following its discovery [7]. According to the Common Vulnerabilities and Exposures (CVE) list of 2019, it was the most frequently reported vulnerability, with more than 400 reported vulnerabilities [8]. As of May 2021, the number of reported buffer overflow vulnerabilities in the CVE database has reached over 13,700 [9].…”
Section: Introductionmentioning
confidence: 99%