skip to main content
10.1145/1985793.1985960acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Empirical results on the study of software vulnerabilities (NIER track)

Authors Info & Claims
Published:21 May 2011Publication History

ABSTRACT

While the software development community has put a significant effort to capture the artifacts related to a discovered vulnerability in organized repositories, much of this information is not amenable to meaningful analysis and requires a deep and manual inspection. In the software assurance community a body of knowledge that provides an enumeration of common weaknesses has been developed, but it is not readily usable for the study of vulnerabilities in specific projects and user environments. We propose organizing the information in project repositories around semantic templates. In this paper, we present preliminary results of an experiment conducted to evaluate the effectiveness of using semantic templates as an aid to studying software vulnerabilities.

References

  1. Abbott, R. P., Chin, J. S. et al. The RISOS Project. Lawrence Livermore Lab TR NBSIR-76-1041,1976.Google ScholarGoogle Scholar
  2. Aslam. Y. A Taxonomy of Security Faults in the UNIX Operating System. Purdue University, August 1995.Google ScholarGoogle Scholar
  3. Bisbey, R. and Hollingworth, D. Protection Analysis: Final Report. ARPA ORDER NO. 2223, ISI/SR-78-13 May 1978.Google ScholarGoogle Scholar
  4. Bishop, M. A Taxonomy of UNIX System and Network Vulnerabilities. UC Davis, CSE-95-10, May 1995.Google ScholarGoogle Scholar
  5. CVE - Common Vulnerabilities and Exposures. http://cve.mitre.org.Google ScholarGoogle Scholar
  6. CWE - Common Weakness Enumeration Version 1.6. 29 Oct. 2009. The MITRE Corporation. http://cwe.mitre.org/.Google ScholarGoogle Scholar
  7. Gandhi, R. A. Siy, H., and Wu, Y. Studying Software Vulnerabilities. CrossTalk, September/October 2010.Google ScholarGoogle Scholar
  8. Gandhi, R. A. Studying Software Vulnerabilities (companion Website). http://faculty.ist.unomaha.edu/rgandhi/st/Google ScholarGoogle Scholar
  9. Howard, M, LeBlanc, D., Viega. J. 19 Deadly Sins of Software Security Programming Flaws and How to Fix Them, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Judd, C., et al. Research Methods in Social Relations. 1991.Google ScholarGoogle Scholar
  11. Landwehr, C., et al. A Taxonomy of Computer Program Security Flaws with Examples. ACM Computing Surveys 26, 3, Sept., 1994 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. National Vulnerability Database. http://nvd.nist.gov/Google ScholarGoogle Scholar
  13. Shapiro, S. et al. An analysis of variance test for normality, 1965.Google ScholarGoogle Scholar
  14. The Apache HTTP Server Project. http://httpd.apache.orgGoogle ScholarGoogle Scholar
  15. The Ten Most Critical Web Application Security Vulnerabilities. The Open Web Application Security Project (OWASP), 2007.Google ScholarGoogle Scholar
  16. Web Application Security Consortium 2005.Google ScholarGoogle Scholar
  17. Weber, S. et al. A Software Flaw Taxonomy: Aiming Tools at Security. (SESS'05) St. Louis, Missouri, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Wu,Y., Gandhi, R. A., and Siy, H. Using Semantic Templates to Study Vulnerabilities Recorded in Large Software Repositories. In Proc. 6th Intl. Workshop on Software Engineering for Secure Systems (SESS'10), South Africa, Cape Town. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Empirical results on the study of software vulnerabilities (NIER track)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ICSE '11: Proceedings of the 33rd International Conference on Software Engineering
          May 2011
          1258 pages
          ISBN:9781450304450
          DOI:10.1145/1985793

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 May 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate276of1,856submissions,15%

          Upcoming Conference

          ICSE 2025

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader