Proceedings of the 14th ACM Conference on Computer and Communications Security 2007
DOI: 10.1145/1315245.1315311
|View full text |Cite
|
Sign up to set email alerts
|

Predicting vulnerable software components

Abstract: Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to components. The resulting ranking of the most vulnerable components is a perfect base for further investigations on what makes components vulnerable.In an investigation of the Mozilla vulnerability history, we surprisingly found that components that had a single vulnerability in the past were generally not likely to have further vulnerabiliti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

7
215
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 332 publications
(230 citation statements)
references
References 32 publications
7
215
1
Order By: Relevance
“…For these case studies, we analyzed the Trac issue reports for two open source web applications, WordPress 8 and WikkaWiki 9 . Trac is a web-based issue management system, similar to Bugzilla …”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For these case studies, we analyzed the Trac issue reports for two open source web applications, WordPress 8 and WikkaWiki 9 . Trac is a web-based issue management system, similar to Bugzilla …”
Section: Methodsmentioning
confidence: 99%
“…Nehaus et al [9] use their tool, Vulture, to predict vulnerable software components in versions of the Mozilla web browser. They demonstrate that vulnerabilities correlate with component imports and that component imports in the Mozilla web browser can be used to consistently and accurately predict vulnerable components.…”
Section: Related Workmentioning
confidence: 99%
“…Neuhaus et al studied Mozilla vulnerabilities in order to predict so far unknown vulnerabilities [11] and Schryen studies many OSS projects in order to find out whether open-source security is a myth [19].…”
Section: Related Workmentioning
confidence: 99%
“…To support this process, researchers have developed vulnerability prediction models, which guide security inspections, such as code reviews [2] or security testing [5], by pointing out components that are likely to be vulnerable [7]. In fact, there are three main approaches, here named as software metrics [8], text mining [7] and includes and function calls [9].…”
Section: Introductionmentioning
confidence: 99%
“…The majority of previous research, i.e., [7], [9], [8], seeks to predict the vulnerable source code files. This choice was confirmed as actionable by Microsoft Windows developers [10] and thus, we make our evaluation at the file granularity level.…”
Section: Introductionmentioning
confidence: 99%