Proceedings of the 17th International Conference on Availability, Reliability and Security 2022
DOI: 10.1145/3538969.3544415
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Several other OSS malware detection tools exist but were excluded from the study either because the tool had unavailable source code, did not use anomaly-based analysis, or lacked published detection rules. Also, there are OSS malware detection tools designed for other programming language ecosystems (e.g., [54] for npm) that could potentially be used, after engineering modifications, to analyze PyPI packages. Future evaluations could therefore benchmark more and different OSS malware detection tools.…”
Section: Threats To Validitymentioning
confidence: 99%
“…Several other OSS malware detection tools exist but were excluded from the study either because the tool had unavailable source code, did not use anomaly-based analysis, or lacked published detection rules. Also, there are OSS malware detection tools designed for other programming language ecosystems (e.g., [54] for npm) that could potentially be used, after engineering modifications, to analyze PyPI packages. Future evaluations could therefore benchmark more and different OSS malware detection tools.…”
Section: Threats To Validitymentioning
confidence: 99%
“…Approach: We use our set of 9 package attributes (Section 3) to train a random forest model to predict the adoption delay of the fix. We use random forest because it is known to offer a good balance between performance and interpretability and is commonly used in software engineering research [15], [43]. When feeding the vulnerability instances to the model, we use the latest vulnerable dependency relationship for each downstream dependent.…”
Section: Rq2: How Can We Identify Packages That Quickly Mitigate Vuln...mentioning
confidence: 99%