skip to main content
10.1145/2372225.2372230acmconferencesArticle/Chapter ViewAbstractPublication PagesesemConference Proceedingsconference-collections
research-article

Software vulnerability prediction using text analysis techniques

Published:21 September 2012Publication History

ABSTRACT

Early identification of software vulnerabilities is essential in software engineering and can help reduce not only costs, but also prevent loss of reputation and damaging litigations for a software firm. Techniques and tools for software vulnerability prediction are thus invaluable. Most of the existing techniques rely on using component characteristic(s) (like code complexity, code churn) for the vulnerability prediction. In this position paper, we present a novel approach for vulnerability prediction that leverages on the analysis of raw source code as text, instead of using "cooked" features. Our initial results seem to be very promising as the prediction model achieves an average accuracy of 0.87, precision of 0.85 and recall of 0.88 on 18 versions of a large mobile application.

References

  1. Android rises, symbian and windows phone 7 launch as worldwide smartphone shipments increase 87.2% year over year, according to idc (2011), http://www.idc.com/Google ScholarGoogle Scholar
  2. Austin, A., Williams, L.: One technique is not enough: A comparison of vulnerability discovery techniques. In: ESEM. pp. 97--106 (2011) Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Fortify: Fortify. https://www.fortify.com/ (2011)Google ScholarGoogle Scholar
  4. Neuhaus, S., Zimmermann, T., Holler, C., Zeller, A.: Predicting vulnerable software components. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (October 2007) Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Shin, Y., Meneely, A., Williams, L., Osborne, J.A.: Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities. IEEE Trans. Software Eng. 37(6), 772--787 (2011) Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Walden, J., Doyle, M.: Savi: Static analysis vulnerability indicator. IEEE Security and Privacy (to appear) (2012) Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Zeman, E.: Android, ios crush blackberry market share (2011), http://www.informationweek.comGoogle ScholarGoogle Scholar
  8. Zimmermann, T., Nagappan, N., Williams, L.: Searching for a needle in a haystack: Predicting security vulnerabilities for windows vista. In: Proceedings of the 3rd International Conference on Software Testing, Verification and Validation (April 2010) Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Software vulnerability prediction using text analysis techniques

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              MetriSec '12: Proceedings of the 4th international workshop on Security measurements and metrics
              September 2012
              32 pages
              ISBN:9781450315081
              DOI:10.1145/2372225

              Copyright © 2012 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 21 September 2012

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Upcoming Conference

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader