skip to main content
10.1145/1853919.1853923acmconferencesArticle/Chapter ViewAbstractPublication PagesesemConference Proceedingsconference-collections
research-article

Predicting vulnerable software components with dependency graphs

Published:15 September 2010Publication History

ABSTRACT

Security metrics and vulnerability prediction for software have gained a lot of interests from the community. Many software security metrics have been proposed e.g., complexity metrics, cohesion and coupling metrics. In this paper, we propose a novel code metric based on dependency graphs to predict vulnerable components. To validate the efficiency of the proposed metric, we conduct a prediction model which targets the JavaScript Engine of Firefox. In this experiment, our prediction model has obtained a very good result in term of accuracy and recall rates. This empirical result is a good evidence showing dependency graphs are also a good option for early indicating vulnerability.

References

  1. }}R. Anderson. Why information security is hard - an economic perspective. In Proc. of ACSAC'01, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}C. Catal and B. Diri. A systematic review of software fault prediction studies. Expert Sys. with App., 36(4):7346--7354, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}I. Chowdhury and M. Zulkernine. Using complexity, coupling, and cohesion metrics as early predictors of vul. J. of Soft. Arch., 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. }}J. Cohen. Statistical Power Analysis for the Behavioral Sciences, 2nd ed. Hillsdale, NJ: Lawrence Erlbaum Associates, 1988.Google ScholarGoogle Scholar
  5. }}M. Gegick. Failure-prone components are also attack-prone components. In Proc. of the 23rd ACM SIGPLAN Conf. on Object-Oriented Prog., Sys., Lang., and Applications (OOPSLA'08), pages 917--918. ACM Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}M. Gegick and L. Williams. Ranking attack-prone components with a predictive model. In Proc. of ISSRE'08, pages 315--316, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}M. Gegick, L. Williams, J. Osborne, and M. Vouk. Prioritizing software security fortification throughcode-level metrics. In Proc. of QoP'08, pages 31--38. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}Y. Jiang, B. Cuki, T. Menzies, and N. Bartlow. Comparing design and code metrics for software quality prediction. In Proc. of PROMISE'08, pages 11--18. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}F. Massacci and V. H. Nguyen. Which is the right source for vulnerabilities studies? an empirical analysis on mozilla firefox. In Proc. of MetriSec'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}T. Menzies, J. Greenwald, and A. Frank. Data mining static code attributes to learn defect predictors. TSE, 33(9):2--13, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}N. Nagappan and T. Ball. Use of relative code churn measures to predict system defect density. In Proc. of ICSE'05, pages 284--292, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. }}S. Neuhaus, T. Zimmermann, C. Holler, and A. Zeller. Predicting vulnerable software components. In Proc. of CCS'07, pages 529--540, October 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. }}H. M. Olague, S. Gholston, and S. Quattlebaum. Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes. TSE, 33(6):402--419, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}T. J. Ostrand and E. J. Weyuker. How to measure success of fault prediction models. In SOQUA '07: Fourth international workshop on Software quality assurance, pages 25--30, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}A. Ozment. Vulnerability Discovery and Software Security. PhD thesis, University of Cambridge. Cambridge, UK, 2007.Google ScholarGoogle Scholar
  16. }}Y. Shin. Exploring complexity metrics as indicators of software vulnerability. In Proc. of the Int. Doctoral Symp. on Empirical Soft. Eng. (IDoESE'08).Google ScholarGoogle Scholar
  17. }}Y. Shin and L. Williams. An empirical model to predict security vulnerabilities using code complexity metrics. In Proc. of ESEM'08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. }}Y. Shin and L. Williams. Is complexity really the enemy of software security? In Proc. of QoP'08, pages 47--50, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}Wessa. P. (2010), Free Statistics Software, Office for Research Development and Education, version 1.1.23-r6. http://www.wessa.net/.Google ScholarGoogle Scholar
  20. }}H. Zhang and X. Zhang. Comments on data mining static code attributes to learn defect predictors. TSE, 33(9):635--637, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. }}H. Zhang, X. Zhang, and M. Gu. Predicting defective software components from code complexity measures. In Procc. of PRDC'07, pages 93--96, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. }}T. Zimmermann and N. Nagappan. Predicting defects with program dependencies. In Proc. of ESEM'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. }}T. Zimmermann, R. Premraj, and A. Zeller. Predicting defects for eclipse. In Proc. of PROMISE'07, page 9. IEEE Computer Society, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. }}T. Zimmermann and P. WeiSSgerber. Preprocessing cvs data for fine-grained analysis. In Proc. of the 1st Int. Working Conf. on Mining Soft. Repo. MSR('04), pages 2--6, May 2004.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Predicting vulnerable software components with dependency graphs

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                MetriSec '10: Proceedings of the 6th International Workshop on Security Measurements and Metrics
                September 2010
                78 pages
                ISBN:9781450303408
                DOI:10.1145/1853919

                Copyright © 2010 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 15 September 2010

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Upcoming Conference

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader