Minimizing Software-Rooted Risk through Library Implementation Selection

P. Sotiropoulos, Christos-Minas Mathas, C. Vassilakis, N. Kolokotronis
{"title":"Minimizing Software-Rooted Risk through Library Implementation Selection","authors":"P. Sotiropoulos, Christos-Minas Mathas, C. Vassilakis, N. Kolokotronis","doi":"10.1109/CSR57506.2023.10224931","DOIUrl":null,"url":null,"abstract":"In contemporary Internet of Things (IoT) systems, complex software artifacts are deployed to realize the required functionalities. The business logic of these software artifacts is uniquely composed through code that is customly developed according to the requirements, while all software artifacts utilize libraries that implement generic functionalities, which are needed in the context of the realized operations. Libraries, however, often entail vulnerabilities, which may be exploited by threat agents to attack the system. In many cases, the functionality required by an application is realized by a number of alternative libraries, with each library having its own list of vulnerabilities, while differentiations in other non-functional properties (e.g. execution efficiency, memory footprint etc.) may also be present. In this paper, we present an approach for automating the task of minimizing the risk level of IoT systems that is owing to the vulnerabilities of libraries required by software artifacts. The proposed approach exploits knowledge on which libraries provide equivalent implementations of the same functionalities, and automatically assesses the risk level of candidate library combinations and finally selects the library configuration exhibiting the minimum risk level to bundle into the executable software artifact. Additionally, the risk level of candidate implementations is constantly monitored for new vulnerability identifications or fixes in the implementations, triggering new risk assessments and producing new executables as appropriate. The proposed approach can be used in IoT platform deployment to minimize the software-rooted risk level.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR57506.2023.10224931","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In contemporary Internet of Things (IoT) systems, complex software artifacts are deployed to realize the required functionalities. The business logic of these software artifacts is uniquely composed through code that is customly developed according to the requirements, while all software artifacts utilize libraries that implement generic functionalities, which are needed in the context of the realized operations. Libraries, however, often entail vulnerabilities, which may be exploited by threat agents to attack the system. In many cases, the functionality required by an application is realized by a number of alternative libraries, with each library having its own list of vulnerabilities, while differentiations in other non-functional properties (e.g. execution efficiency, memory footprint etc.) may also be present. In this paper, we present an approach for automating the task of minimizing the risk level of IoT systems that is owing to the vulnerabilities of libraries required by software artifacts. The proposed approach exploits knowledge on which libraries provide equivalent implementations of the same functionalities, and automatically assesses the risk level of candidate library combinations and finally selects the library configuration exhibiting the minimum risk level to bundle into the executable software artifact. Additionally, the risk level of candidate implementations is constantly monitored for new vulnerability identifications or fixes in the implementations, triggering new risk assessments and producing new executables as appropriate. The proposed approach can be used in IoT platform deployment to minimize the software-rooted risk level.
通过库实现选择最小化软件根源风险
在当代物联网(IoT)系统中,需要部署复杂的软件构件来实现所需的功能。这些软件工件的业务逻辑是通过根据需求定制开发的代码唯一地组成的,而所有软件工件都利用实现通用功能的库,这些库在已实现的操作的上下文中是必需的。然而,库通常包含漏洞,这些漏洞可能被威胁代理利用来攻击系统。在许多情况下,应用程序所需的功能是由许多替代库实现的,每个库都有自己的漏洞列表,而其他非功能属性(例如执行效率,内存占用等)的差异也可能存在。在本文中,我们提出了一种自动化最小化物联网系统风险级别的方法,该任务是由于软件工件所需的库的漏洞造成的。所提出的方法利用了哪些库提供相同功能的等效实现的知识,并自动评估候选库组合的风险级别,最后选择显示最小风险级别的库配置,将其捆绑到可执行软件工件中。此外,候选实现的风险级别将不断受到监视,以确定实现中的新漏洞或修复,从而触发新的风险评估,并根据需要生成新的可执行文件。该方法可用于物联网平台部署,以最大限度地降低软件根源风险水平。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信