skip to main content
10.1145/3503229.3547058acmconferencesArticle/Chapter ViewAbstractPublication PagessplcConference Proceedingsconference-collections
short-paper

Advisory: vulnerability analysis in software development project dependencies

Published: 12 September 2022 Publication History

Abstract

Security has become a crucial factor in the development of software systems. The number of dependencies in software systems is becoming a source of countless bugs and vulnerabilities. In the past, the product line community has proposed several techniques and mechanisms to cope with the problems that arise when dealing with variability and dependency management in such systems. In this paper, we present Advisory, a solution that allows automated dependency analysis for vulnerabilities within software projects based on techniques from the product line community. Advisory first inspects software dependencies, then generates a dependency graph, to which security information about vulnerabilities is attributed and translated into a formal model, in this case, based on SMT. Finally, Advisory provides a set of analysis and reasoning operations on these models that allow extracting helpful information about the location of vulnerabilities of the project configuration space, as well as details for advising on the security risk of these projects and their possible configurations.

References

[1]
Paolo Arcaini, Angelo Gargantini, and Paolo Vavassori. 2015. Generating tests for detecting faults in feature models. In 2015 IEEE 8th ICST. IEEE, 1--10.
[2]
Jan Bosch. 2018. Towards a new digital business operating system: Speed, data, ecosystems, and empowerment (keynote). In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 2--2.
[3]
Shuvalaxmi Dass and Akbar Siami Namin. 2020. Vulnerability Coverage for Adequacy Security Testing. In 35th Annual ACM Symposium on Applied Computing (Brno, Czech Republic) (SAC '20). ACM, New York, NY, USA, 540--543.
[4]
José Angel Galindo Duarte. 2015. Evolution, testing and configuration of variability systems intensive. Ph. D. Dissertation. University of Rennes 1, France.
[5]
José Angel Galindo, David Benavides, and Sergio Segura. 2010. Debian Packages Repositories as Software Product Line Models. Towards Automated Analysis. In ACOTA, Belgium, September, 2010, Vol. 688. CEUR-WS.org, 29--34.
[6]
José A Galindo, David Benavides, Pablo Trinidad, Antonio-Manuel Gutiérrez-Fernández, and Antonio Ruiz-Cortés. 2019. Automated analysis of feature models: Quo vadis? Computing 101, 5 (2019), 387--433.
[7]
Wenhui Hu, Yu Wang, Xueyang Liu, Jinan Sun, Qing Gao, and Yu Huang. 2019. Open source software vulnerability propagation analysis algorithm based on knowledge graph. In 2019 IEEE SmartCloud. 121--127.
[8]
Jeffrey R. Jones. 2007. Estimating Software Vulnerabilities. IEEE Security Privacy 5, 4 (2007), 28--32.
[9]
P.V.R. Murthy and R.G. Shilpa. 2018. Vulnerability Coverage Criteria for Security Testing of Web Applications. In 2018 ICACCI. 489--494.
[10]
Salvador Martínez Perez, Valerio Cosentino, and Jordi Cabot. 2017. Model-based analysis of Java EE web security misconfigurations. Comput. Lang. Syst. Struct. 49 (2017), 36--61.
[11]
Ángel Jesús Varela-Vaca, Rafael M. Gasca, Jose Antonio Carmona-Fombella, and María Teresa Gómez López. 2020. AMADEUS: towards the AutoMAteD secUrity teSting. In 24th ACM SPLC '20, Montreal, Quebec, Canada, October 19-23, 2020, Volume A. ACM, 11:1--11:12.
[12]
Tarun Yadav and Arvind Mallari Rao. 2015. Technical Aspects of Cyber Kill Chain. In Security in Computing and Communications. 438--452.

Cited By

View all
  • (2024)Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT)Computers and Security10.1016/j.cose.2023.103669139:COnline publication date: 1-Apr-2024
  • (2023)FLAMAProceedings of the 27th ACM International Systems and Software Product Line Conference - Volume B10.1145/3579028.3609008(16-19)Online publication date: 28-Aug-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SPLC '22: Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B
September 2022
246 pages
ISBN:9781450392068
DOI:10.1145/3503229
© 2022 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 September 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CVE
  2. dependency
  3. impact
  4. library
  5. risk
  6. security
  7. software project
  8. verification
  9. vulnerability

Qualifiers

  • Short-paper

Funding Sources

  • COPERNICA
  • METAMORFOSIS
  • AETHER-US

Conference

SPLC '22
Sponsor:

Acceptance Rates

SPLC '22 Paper Acceptance Rate 14 of 41 submissions, 34%;
Overall Acceptance Rate 167 of 463 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT)Computers and Security10.1016/j.cose.2023.103669139:COnline publication date: 1-Apr-2024
  • (2023)FLAMAProceedings of the 27th ACM International Systems and Software Product Line Conference - Volume B10.1145/3579028.3609008(16-19)Online publication date: 28-Aug-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media