2021
DOI: 10.1016/j.jss.2020.110653
|View full text |Cite
|
Sign up to set email alerts
|

Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities

Abstract: Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(21 citation statements)
references
References 34 publications
0
21
0
Order By: Relevance
“…Almost 40% of the build problems are related to missing dependencies, followed by compilation errors in 22% of the cases. Gkortzis et al [23] observe a very similar build failure rate (33.7%), with the same causes. Neitsch et al [24] analyze the build systems of 5 open-source multilanguage Ubuntu packages.…”
Section: Related Workmentioning
confidence: 65%
“…Almost 40% of the build problems are related to missing dependencies, followed by compilation errors in 22% of the cases. Gkortzis et al [23] observe a very similar build failure rate (33.7%), with the same causes. Neitsch et al [24] analyze the build systems of 5 open-source multilanguage Ubuntu packages.…”
Section: Related Workmentioning
confidence: 65%
“…The effect of software reuse on security is investigated by Gkortzis et al in [2], who show empirical evidence of the relation between the size of a code base and its likelihood to contain some vulnerabilities. Recently, Soto-Valero et al conducted a large-scale study to assess the prevalence of bloated dependencies in the Maven ecosystem [1].…”
Section: Related Workmentioning
confidence: 99%
“…While automated dependency management simplifies software reuse, it may contribute to the phenomenon of software bloat [1]. As Gkortzis et al put it "code reuse cuts both ways", since "a system can become more secure by relying on mature dependencies, or more insecure by exposing a larger attack surface via exploitable dependencies" [2].…”
Section: Introductionmentioning
confidence: 99%
“…The web application is protected within the developer's skill set, and therefore, they require to know about all the exploits and the approach to work around them. It can be challenging for small web applications and examine the web application for security vulnerabilities [5,6]. Vulnerabilities and attack detection processes are reported based on features' selection [7].…”
Section: Introductionmentioning
confidence: 99%