对已知软件缺陷进行系统调查的框架

S. Sargsyan, Movses Tovmasyan, J. Hakobyan, H. Aslanyan, S. Kurmangaleev
{"title":"对已知软件缺陷进行系统调查的框架","authors":"S. Sargsyan, Movses Tovmasyan, J. Hakobyan, H. Aslanyan, S. Kurmangaleev","doi":"10.1109/ivmem53963.2021.00019","DOIUrl":null,"url":null,"abstract":"It is common practice to use third-party software in projects, which can lead to security problems. There are numerous cases when the known vulnerability was fixed in the upstream repository of the project but still exists in other projects. We present a framework for systematic analysis and detection of publicly known vulnerabilities in a large codebase. On the first stage, the vast codebase of open-source projects and known vulnerabilities are collected. On the second stage, for each known vulnerability, we try to find the corresponding source repository and extract the fixing patch. Based on extracted patches we construct possible vulnerable code fragments and try to find all their clones in the collected codebase. During the experimental setup, we have collected more than 42k open-source packages from Debian OS distribution. Analysis of these packages allowed us to detect more than four hundred copies of unfixed vulnerabilities, seven of them have already been approved and fixed by the vendors.","PeriodicalId":360766,"journal":{"name":"2021 Ivannikov Memorial Workshop (IVMEM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A framework for a systematic survey of known software defects\",\"authors\":\"S. Sargsyan, Movses Tovmasyan, J. Hakobyan, H. Aslanyan, S. Kurmangaleev\",\"doi\":\"10.1109/ivmem53963.2021.00019\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is common practice to use third-party software in projects, which can lead to security problems. There are numerous cases when the known vulnerability was fixed in the upstream repository of the project but still exists in other projects. We present a framework for systematic analysis and detection of publicly known vulnerabilities in a large codebase. On the first stage, the vast codebase of open-source projects and known vulnerabilities are collected. On the second stage, for each known vulnerability, we try to find the corresponding source repository and extract the fixing patch. Based on extracted patches we construct possible vulnerable code fragments and try to find all their clones in the collected codebase. During the experimental setup, we have collected more than 42k open-source packages from Debian OS distribution. Analysis of these packages allowed us to detect more than four hundred copies of unfixed vulnerabilities, seven of them have already been approved and fixed by the vendors.\",\"PeriodicalId\":360766,\"journal\":{\"name\":\"2021 Ivannikov Memorial Workshop (IVMEM)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Ivannikov Memorial Workshop (IVMEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ivmem53963.2021.00019\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Ivannikov Memorial Workshop (IVMEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ivmem53963.2021.00019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在项目中使用第三方软件是一种常见的做法,这可能会导致安全问题。有很多情况下,已知的漏洞在项目的上游存储库中被修复,但在其他项目中仍然存在。我们提出了一个框架,用于系统分析和检测大型代码库中公开已知的漏洞。在第一阶段,收集开源项目的大量代码库和已知漏洞。在第二阶段,对于每个已知的漏洞,我们尝试找到相应的源存储库并提取修复补丁。基于提取的补丁,我们构建可能的易受攻击的代码片段,并试图在收集的代码库中找到它们的所有克隆。在实验设置期间,我们从Debian OS发行版收集了超过42000个开源软件包。对这些软件包的分析使我们能够检测到400多个未修复的漏洞副本,其中7个已经被供应商批准并修复。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A framework for a systematic survey of known software defects
It is common practice to use third-party software in projects, which can lead to security problems. There are numerous cases when the known vulnerability was fixed in the upstream repository of the project but still exists in other projects. We present a framework for systematic analysis and detection of publicly known vulnerabilities in a large codebase. On the first stage, the vast codebase of open-source projects and known vulnerabilities are collected. On the second stage, for each known vulnerability, we try to find the corresponding source repository and extract the fixing patch. Based on extracted patches we construct possible vulnerable code fragments and try to find all their clones in the collected codebase. During the experimental setup, we have collected more than 42k open-source packages from Debian OS distribution. Analysis of these packages allowed us to detect more than four hundred copies of unfixed vulnerabilities, seven of them have already been approved and fixed by the vendors.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信