Proceedings of the 4th ACM Workshop on Quality of Protection 2008
DOI: 10.1145/1456362.1456372
|View full text |Cite
|
Sign up to set email alerts
|

Is complexity really the enemy of software security?

Abstract: Software complexity is often hypothesized to be the enemy of software security. We performed statistical analysis on nine code complexity metrics from the JavaScript Engine in the Mozilla application framework to investigate if this hypothesis is true. Our initial results show that the nine complexity measures have weak correlation (ρ=0.30 at best) with security problems for Mozilla JavaScript Engine. The study should be replicated on more products with design and code-level metrics. It may be necessary to cre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
67
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 101 publications
(67 citation statements)
references
References 4 publications
0
67
0
Order By: Relevance
“…They were able to identify 45% of all of the vulnerable components in Mozilla. Shin and Williams [27] found a weak correlation (0.2) between complexity and security vulnerabilities in Mozilla, indicating that complexity contributes to security problems, but is not the only factor. We also found a 0.2 correlation between file coupling and vulnerability counts in a large telecommunications system [10].…”
Section: Vulnerability-and Attack-prone Component Predictionsmentioning
confidence: 99%
“…They were able to identify 45% of all of the vulnerable components in Mozilla. Shin and Williams [27] found a weak correlation (0.2) between complexity and security vulnerabilities in Mozilla, indicating that complexity contributes to security problems, but is not the only factor. We also found a 0.2 correlation between file coupling and vulnerability counts in a large telecommunications system [10].…”
Section: Vulnerability-and Attack-prone Component Predictionsmentioning
confidence: 99%
“…Although it is a relatively new area of research, a great number of VPMs has already been proposed in the related literature. As stated in [9], the main VPMs that can be found in the literature utilize software metrics [13][14][15][16][17][18][19][20][21][22], text mining [23][24][25][26][27][28], and security-related static analysis alerts [10,[29][30][31][32]] to predict vulnerabilities. These types of VPMs are analyzed in the rest of this section.…”
Section: Vulnerability Prediction Modelingmentioning
confidence: 99%
“…Shin and Williams [13,14] were the first to investigate the ability of software metrics, particularly complexity metrics, to predict vulnerabilities in software products. Several regression models were built based on different subsets of the studied metrics in order to discriminate between vulnerable and non-vulnerable (i.e.…”
Section: Vulnerability Prediction Modelingmentioning
confidence: 99%
“…Shin and Williams [13] investigated the relationship between classical complexity metrics and vulnerabilities. Shin and Williams performed an empirical case study on the JavaScript Engine in the Mozilla application framework and discovered that nine complexity measures such as McCabe's cyclomatic complexity and nesting are weakly correlated with the number of vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Recent usage statistics indicate that 30% of web applications are implemented using PHP, which is more than any other framework 13 . We were also interested in controlling language-dependent factors of our analysis since we are not interested in comparing programming languages in terms of their security.…”
Section: Selecting the Study Subjectsmentioning
confidence: 99%