Skip to main content
Top
Published in: Software Quality Journal 2/2018

28-03-2017

Estimating software robustness in relation to input validation vulnerabilities using Bayesian networks

Authors: Ekincan Ufuktepe, Tugkan Tuglular

Published in: Software Quality Journal | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Estimating the robustness of software in the presence of invalid inputs has long been a challenging task owing to the fact that developers usually fail to take the necessary action to validate inputs during the design and implementation of software. We propose a method for estimating the robustness of software in relation to input validation vulnerabilities using Bayesian networks. The proposed method runs on all program functions and/or methods. It calculates a robustness value using information on the existence of input validation code in the functions and utilizing common weakness scores of known input validation vulnerabilities. In the case study, ten well-known software libraries implemented in the JavaScript language, which are chosen because of their increasing popularity among software developers, are evaluated. Using our method, software development teams can track changes made to software to deal with invalid inputs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Alkhalaf, M.A. (2014). Automatic Detection and Repair of Input Validation and Sanitization Bugs (PhD dissertation, University Of California Santa Barbara). Alkhalaf, M.A. (2014). Automatic Detection and Repair of Input Validation and Sanitization Bugs (PhD dissertation, University Of California Santa Barbara).
go back to reference Avizienis, A., Laprie, J., Randell, B. (2001). Fundamental Concepts of Dependability, Tech. Rep. 1145, University of Newcastle. Avizienis, A., Laprie, J., Randell, B. (2001). Fundamental Concepts of Dependability, Tech. Rep. 1145, University of Newcastle.
go back to reference Ben-Gal, I. (2007). Bayesian networks. In F. Ruggeri, F. Faltin, & R. Kenett (Eds.), Encyclopedia of statistics in Quality & Reliability. New York: Wiley. Ben-Gal, I. (2007). Bayesian networks. In F. Ruggeri, F. Faltin, & R. Kenett (Eds.), Encyclopedia of statistics in Quality & Reliability. New York: Wiley.
go back to reference Bobbio, A., Portinale, L., Minichino, M., & Ciancamerla, E. (2001). Improving the analysis of dependable systems by mapping fault trees into Bayesian networks. Reliability Engineering & System Safety, 71(3), 249–260.CrossRef Bobbio, A., Portinale, L., Minichino, M., & Ciancamerla, E. (2001). Improving the analysis of dependable systems by mapping fault trees into Bayesian networks. Reliability Engineering & System Safety, 71(3), 249–260.CrossRef
go back to reference Christey, S. (2005). Preliminary list of vulnerability examples for researchers. NIST Workshop Defining the State of the Art of Software Security Tools, Gaithersburg, MD. Christey, S. (2005). Preliminary list of vulnerability examples for researchers. NIST Workshop Defining the State of the Art of Software Security Tools, Gaithersburg, MD.
go back to reference Dejaeger, K., Verbraken, T., & Baesens, B. (2013). Toward comprehensible software fault prediction models using bayesian network classifiers. IEEE Transactions on Software Engineering, 39(2), 237–257. doi:10.1109/TSE.2012.20.CrossRef Dejaeger, K., Verbraken, T., & Baesens, B. (2013). Toward comprehensible software fault prediction models using bayesian network classifiers. IEEE Transactions on Software Engineering, 39(2), 237–257. doi:10.​1109/​TSE.​2012.​20.CrossRef
go back to reference Fenton, N., & Neil, M. (2012). Risk assessment and decision analysis with Bayesian networks. Boca Raton: CRC Press.MATH Fenton, N., & Neil, M. (2012). Risk assessment and decision analysis with Bayesian networks. Boca Raton: CRC Press.MATH
go back to reference Franke, U., Johnson, P., König, J., & Marcks von Würtemberg, L. (2011). Availability of enterprise IT systems: an expert-based Bayesian framework. Software Quality Journal, 20(2), 369–394. doi:10.1007/s11219-011-9141-z.CrossRef Franke, U., Johnson, P., König, J., & Marcks von Würtemberg, L. (2011). Availability of enterprise IT systems: an expert-based Bayesian framework. Software Quality Journal, 20(2), 369–394. doi:10.​1007/​s11219-011-9141-z.CrossRef
go back to reference Frigault, M., & Wang, L. (2008). Measuring network security using Bayesian network-based attack graphs. In 32nd annual IEEE international conference on computer software and applications (COMPSAC '08) (pp. 698–703). Frigault, M., & Wang, L. (2008). Measuring network security using Bayesian network-based attack graphs. In 32nd annual IEEE international conference on computer software and applications (COMPSAC '08) (pp. 698–703).
go back to reference Halfond, W.G., Viegas, J., & Orso, A., (2006). A classification of SQL-injection attacks and countermeasures. In Proceedings of the IEEE International Symposium on Secure Software Engineering (Vol. 1, pp. 13–15). IEEE. Halfond, W.G., Viegas, J., & Orso, A., (2006). A classification of SQL-injection attacks and countermeasures. In Proceedings of the IEEE International Symposium on Secure Software Engineering (Vol. 1, pp. 13–15). IEEE.
go back to reference IEEE Std 610.12-1990 (1990). IEEE Standard Glossary of Software Engineering Terminology. IEEE Std 610.12-1990 (1990). IEEE Standard Glossary of Software Engineering Terminology.
go back to reference Jensen, S.H., Møller, A., & Thiemann, P. (2009). Type analysis for Java Script. In Proc. 16th International Static Analysis Symposium, SAS ‘09, LNCS (vol. 5673, pp. 238–255). Berlin Heidelberg New York: Springer. Jensen, S.H., Møller, A., & Thiemann, P. (2009). Type analysis for Java Script. In Proc. 16th International Static Analysis Symposium, SAS ‘09, LNCS (vol. 5673, pp. 238–255). Berlin Heidelberg New York: Springer.
go back to reference Jourdan, G. V. (2008). Data validation, data neutralization, data footprint: a framework against injection attacks. Open Software Engineering Journal, 2, 45–54.CrossRef Jourdan, G. V. (2008). Data validation, data neutralization, data footprint: a framework against injection attacks. Open Software Engineering Journal, 2, 45–54.CrossRef
go back to reference Kondakci, S. (2010). Network security risk assessment using Bayesian belief networks. In IEEE international conference on social computing (social com) (pp. 952–960). Kondakci, S. (2010). Network security risk assessment using Bayesian belief networks. In IEEE international conference on social computing (social com) (pp. 952–960).
go back to reference Korb, K. B., & Nicholson, A. E. (2003). Bayesian artificial intelligence. Boca Raton: CRC Press.CrossRefMATH Korb, K. B., & Nicholson, A. E. (2003). Bayesian artificial intelligence. Boca Raton: CRC Press.CrossRefMATH
go back to reference Kuperman, B. A., Brodley, C. E., Ozdoganoglu, H., Vijaykumar, T. N., & Jalote, A. (2005). Detection and prevention of stack buffer overflow attacks. Communications of the ACM, 48(11), 50–56.CrossRef Kuperman, B. A., Brodley, C. E., Ozdoganoglu, H., Vijaykumar, T. N., & Jalote, A. (2005). Detection and prevention of stack buffer overflow attacks. Communications of the ACM, 48(11), 50–56.CrossRef
go back to reference Perkusich, M., Soares, G., Almeida, H., & Perkusich, A. (2015). A procedure to detect problems of processes in software development projects using Bayesian networks. Expert Systems with Applications, 42(1), 437–450. doi:10.1016/j.eswa.2014.08.015.CrossRef Perkusich, M., Soares, G., Almeida, H., & Perkusich, A. (2015). A procedure to detect problems of processes in software development projects using Bayesian networks. Expert Systems with Applications, 42(1), 437–450. doi:10.​1016/​j.​eswa.​2014.​08.​015.CrossRef
go back to reference Shahrokni, A., & Feldt, R. (2013). A systematic review of software robustness. Information and Software Technology, 55, 1–17.CrossRef Shahrokni, A., & Feldt, R. (2013). A systematic review of software robustness. Information and Software Technology, 55, 1–17.CrossRef
go back to reference Wagner, S. (2010). A Bayesian network approach to assess and predict software quality using activity-based quality models. Information and Software Technology, 52, 1230–1241.CrossRef Wagner, S. (2010). A Bayesian network approach to assess and predict software quality using activity-based quality models. Information and Software Technology, 52, 1230–1241.CrossRef
go back to reference Weber, P., Medina-Oliva, G., Simon, C., & Iung, B. (2012). Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas. Engineering Applications of Artificial Intelligence, 25(4), 671–682. doi:10.1016/j.engappai.2010.06.002.CrossRef Weber, P., Medina-Oliva, G., Simon, C., & Iung, B. (2012). Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas. Engineering Applications of Artificial Intelligence, 25(4), 671–682. doi:10.​1016/​j.​engappai.​2010.​06.​002.CrossRef
Metadata
Title
Estimating software robustness in relation to input validation vulnerabilities using Bayesian networks
Authors
Ekincan Ufuktepe
Tugkan Tuglular
Publication date
28-03-2017
Publisher
Springer US
Published in
Software Quality Journal / Issue 2/2018
Print ISSN: 0963-9314
Electronic ISSN: 1573-1367
DOI
https://doi.org/10.1007/s11219-017-9359-5

Other articles of this Issue 2/2018

Software Quality Journal 2/2018 Go to the issue

OriginalPaper

In this issue

Premium Partner