Write a Blog >>
ASE 2020
Mon 21 - Fri 25 September 2020 Melbourne, Australia
Mon 21 Sep 2020 03:38 - 03:50 at Kangaroo - Session 1 Paper Presentation

Context: Insecure coding patterns (ICPs), such as hard-coded passwords can be inadvertently introduced in infrastructure as code (IaC) scripts, providing malicious users the opportunity to attack provisioned computing infrastructure. As performing code reviews is resource-intensive, a characterization of co-located ICPs, i.e., ICPs that occur together in a script can help practitioners to prioritize their review efforts and mitigate ICPs in IaC scripts. Objective: The goal of this paper is to help practitioners in prioritizing code review efforts for infrastructure as code (IaC) scripts by conducting an empirical study of co-located insecure coding patterns in IaC scripts. Methodology: We conduct an empirical study with 1613, 2764 and 2845 Puppet scripts respectively collected from three organizations namely, Mozilla, Openstack, and Wikimedia. We apply association rule mining to identify co-located ICPs in IaC scripts. Results: We observe 17.9%, 32.9%, and 26.7% of the scripts to include co-located ICPs respectively, for Mozilla, Openstack, and Wikimedia. The most frequent co-located ICP category is hard-coded secret and suspicious comment. Conclusion: Practitioners can prioritize code review efforts for IaC scripts by reviewing scripts that include co-located ICPs.

Mon 21 Sep

Displayed time zone: (UTC) Coordinated Universal Time change

02:50 - 03:50
Session 1 Paper Presentation[Workshop] HCSE&CS at Kangaroo
02:50
12m
Talk
A Risk Homeostasis Perspective on Zimbabwean Protective Point-of-Sale Transaction BehavioursWorkshop
[Workshop] HCSE&CS
Alfred Musarurwa Abertay University, Karen Renaud Abertay University, Tim Shuermann TU Darmstadt
03:02
12m
Talk
Designing a Serious Game: Teaching Developers to Embed Privacy into Software SystemsWorkshop
[Workshop] HCSE&CS
Nalin Asanka Gamagedara Arachchilage La Trobe University, Australia, Mumtaz Abdulhameed Technovation Consulting & Training PVT
03:14
12m
Talk
Vulnerability Discovery Strategies Used in Software ProjectsWorkshop
[Workshop] HCSE&CS
Farzana Ahamed Bhuiyan Tennessee Tech University, Akond Rahman Tennessee Tech University, Patrick Morrison IBM
03:26
12m
Talk
An Informed Consent Model for Handling the Privacy Paradox in Smart BuildingsWorkshop
[Workshop] HCSE&CS
Chehara Pathmabandu Monash University, Mohan Baruwal Chhetri Data61 CSIRO Australia, John Grundy Monash University, A: Zubair Baig Deakin University
03:38
12m
Talk
Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code ScriptsWorkshop
[Workshop] HCSE&CS
Farzana Ahamed Bhuiyan Tennessee Tech University, Akond Rahman Tennessee Tech University