2018 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2018
DOI: 10.1109/icsme.2018.00054
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Metadata: Code-Centric and Usage-Based Analysis of Known Vulnerabilities in Open-Source Software

Abstract: The use of open-source software (OSS) is ever-increasing, and so is the number of open-source vulnerabilities being discovered and publicly disclosed. The gains obtained from the reuse of community-developed libraries may be offset by the cost of timely detecting, assessing, and mitigating their vulnerabilities. In this paper we present a novel method to detect, assess and mitigate OSS vulnerabilities that improves on state-of-the-art approaches, which commonly depend on metadata to identify vulnerable OSS dep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 66 publications
(52 citation statements)
references
References 17 publications
0
52
0
Order By: Relevance
“…In this paper we rely on the terminology established among practitioners and used in well-known dependency manage- 3. Similarly to releasing Eclipse Steady (https://eclipse.github.io/ steady/) after publishing [6], we are planning to undergo the SAP procedure for publishing the tool behind Vuln4Real as FOSS. A reader interested in accessing the tool may contact the corresponding author.…”
Section: Terminologymentioning
confidence: 99%
See 4 more Smart Citations
“…In this paper we rely on the terminology established among practitioners and used in well-known dependency manage- 3. Similarly to releasing Eclipse Steady (https://eclipse.github.io/ steady/) after publishing [6], we are planning to undergo the SAP procedure for publishing the tool behind Vuln4Real as FOSS. A reader interested in accessing the tool may contact the corresponding author.…”
Section: Terminologymentioning
confidence: 99%
“…We rely on the works from Plate et al [18] and Ponta et al [6], who propose a precise approach to use the patchbased mapping of vulnerabilities onto the affected components (see Section 6).…”
Section: Vulnerability Matching Approachesmentioning
confidence: 99%
See 3 more Smart Citations