Title of article :
The life and death of statically detected vulnerabilities: An empirical study
Author/Authors :
Penta، نويسنده , , Massimiliano Di and Cerulo، نويسنده , , Luigi and Aversano، نويسنده , , Lerina، نويسنده ,
Issue Information :
ماهنامه با شماره پیاپی سال 2009
Pages :
16
From page :
1469
To page :
1484
Abstract :
Vulnerable statements constitute a major problem for developers and maintainers of networking systems. Their presence can ease the success of security attacks, aimed at gaining unauthorized access to data and functionality, or at causing system crashes and data loss. Examples of attacks caused by source code vulnerabilities are buffer overflows, command injections, and cross-site scripting. aper reports on an empirical study, conducted across three networking systems, aimed at observing the evolution and decay of vulnerabilities detected by three freely available static analysis tools. In particular, the study compares the decay of different kinds of vulnerabilities, characterizes the decay likelihood through probability density functions, and reports a quantitative and qualitative analysis of the reasons for vulnerability removals. The study is performed by using a framework that traces the evolution of source code fragments across subsequent commits.
Keywords :
empirical study , Software vulnerabilities , mining software repositories
Journal title :
Information and Software Technology
Serial Year :
2009
Journal title :
Information and Software Technology
Record number :
2374533
Link To Document :
بازگشت