Write a Blog >>
ICSE 2023
Sun 14 - Sat 20 May 2023 Melbourne, Australia
Wed 17 May 2023 15:45 - 16:00 at Meeting Room 105 - Vulnerability analysis and assessment Chair(s): Xiaoyin Wang
Thu 18 May 2023 15:19 - 15:21 at Meeting Room 105 - Posters 2

Tools that alert developers about library vulnerabilities depend on accurate, up-to-date vulnerability databases which are maintained by security researchers. These databases record the libraries related to each vulnerability. However, the vulnerability reports may not explicitly list every library and human analysis is required to determine all the relevant libraries. Human analysis may be slow and expensive, which motivates the need for automated approaches. Researchers and practitioners have proposed to automatically identify libraries from vulnerability reports using extreme multi-label learning (XML).

While state-of-the-art XML techniques showed promising performance, their experiment settings do not practically fit what happens in reality. Previous studies randomly split the vulnerability reports data for training and testing their models without considering the chronological order of the reports. This may unduly train the models on chronologically newer reports while testing the models on chronologically older ones. However, in practice, one often receives chronologically new reports, which may be related to previously unseen libraries. Under this practical setting, we observe that the performance of current XML techniques declines substantially, e.g., F1 decreased from 0.7 to 0.24 under experiments without and with consideration of chronological order of vulnerability reports.

We propose a practical library identification approach, namely CHRONOS, based on zero-shot learning. The novelty of CHRONOS is three-fold. First, CHRONOS fits into the practical pipeline by considering the chronological order of vulnerability reports. Second, CHRONOS enriches the data of the vulnerability descrip- tions and labels using a carefully designed data enhancement step. Third, CHRONOS exploits the temporal ordering of the vulnerability reports using a cache to prioritize prediction of versions of libraries that recently had reports of vulnerabilities.

In our experiments, CHRONOS achieves an average F1-score of 0.75, 3x better than the best XML-based approach. Data enhancement and the time-aware adjustment improve CHRONOS over the vanilla zero-shot learning model by 27% in average F1.

Wed 17 May

Displayed time zone: Hobart change

15:45 - 17:15
Vulnerability analysis and assessmentTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 105
Chair(s): Xiaoyin Wang University of Texas at San Antonio
15:45
15m
Talk
Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Technical Track
Yunbo Lyu Singapore Management University, Le-Cong Thanh The University of Melbourne, Hong Jin Kang UCLA, Ratnadira Widyasari Singapore Management University, Singapore, Zhipeng Zhao Singapore Management University, Xuan-Bach D. Le University of Melbourne, Ming Li Nanjing University, David Lo Singapore Management University
Pre-print
16:00
15m
Talk
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem
Technical Track
Yulun Wu Huazhong University of Science and Technology, Zeliang Yu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Qiang Li Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Pre-print
16:15
15m
Talk
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript
Technical Track
Masudul Hasan Masud Bhuiyan CISPA Helmholtz Center for Information Security, Adithya Srinivas Parthasarathy Indian Institute of Information Technology, Design and Manufacturing, Kancheepuram, Nikos Vasilakis Massachusetts Institute of Technology, Michael Pradel University of Stuttgart, Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security
Pre-print
16:30
15m
Talk
On Privacy Weaknesses and Vulnerabilities in Software Systems
Technical Track
Pattaraporn Sangaroonsilp University of Wollongong, Hoa Khanh Dam University of Wollongong, Aditya Ghose University of Wollongong
16:45
7m
Talk
A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph
DEMO - Demonstrations
Jiamou Sun CSIRO's Data61, Zhenchang Xing CSIRO’s Data61; Australian National University, Qinghua Lu CSIRO’s Data61, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61
16:52
7m
Talk
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities
Journal-First Papers
Imen Sayar IRIT, University of Toulouse, IUT Blagnac Toulouse II, 1 Place Georges Brassens, Blagnac Cedex, France, 31703, Alexandre Bartel Umeå University, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Yves Le Traon University of Luxembourg, Luxembourg
17:00
7m
Talk
Blindspots in Python and Java APIs Result in Vulnerable Code
Journal-First Papers
Yuriy Brun University of Massachusetts, Tian Lin University of Florida, Jessie Elise Somerville University of Florida, Elisha M. Myers Florida Atlantic University, Natalie C. Ebner University of Florida
Link to publication DOI Pre-print Media Attached

Thu 18 May

Displayed time zone: Hobart change

15:15 - 15:45
15:15
2m
Short-paper
Values@Runtime: An Adaptive Framework for Operationalising Values
SEIS - Software Engineering in Society
Amel Bennaceur The Open University, UK, Diane Hassett Lero, University of Limerick, Ireland, Bashar Nuseibeh The Open University, UK; Lero, University of Limerick, Ireland, Andrea Zisman The Open University, UK
15:17
2m
Talk
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports
Technical Track
Sunzhou Huang University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio
Pre-print Media Attached
15:19
2m
Talk
Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Technical Track
Yunbo Lyu Singapore Management University, Le-Cong Thanh The University of Melbourne, Hong Jin Kang UCLA, Ratnadira Widyasari Singapore Management University, Singapore, Zhipeng Zhao Singapore Management University, Xuan-Bach D. Le University of Melbourne, Ming Li Nanjing University, David Lo Singapore Management University
Pre-print
15:21
2m
Short-paper
Contradicting Motivations in Civic Tech Software Development: Analysis of a Grassroots Project
SEIS - Software Engineering in Society
Antti Knutas LUT University, Dominik Siemon LUT University, Natasha Tylosky LUT University, Giovanni Maccani Ideas for Change
Pre-print
15:24
2m
Talk
Usability-Oriented Design of Liquid Types for Java
Technical Track
Catarina Gamboa CMU and LASIGE, Paulo Canelas Carnegie Mellon University, Christopher Steven Timperley Carnegie Mellon University, Alcides Fonseca University of Lisbon
DOI
15:26
2m
Talk
When to Say What: Learning to Find Condition-Message Inconsistencies
Technical Track
Islem BOUZENIA University of Stuttgart, Michael Pradel University of Stuttgart
Pre-print
15:31
2m
Poster
GLAD: Neural Predicate Synthesis to Repair Omission Faults
Posters
Sungmin Kang KAIST, Shin Yoo KAIST
15:33
2m
Short-paper
Gender Representation Among Contributors to Open-Source Infrastructure - An Analysis of 20 Package Manager Ecosystems
SEIS - Software Engineering in Society
Huilian Sophie Qiu Carnegie Mellon University, Zihe H Zhao Rice University, Tielin Katy Yu Carnegie Mellon University, Justin Wang Carnegie Mellon University, Alexander Ma Carnegie Mellon University, Hongbo Fang Carnegie Mellon University, Laura Dabbish Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University
15:35
2m
Short-paper
Software Engineering for Smart Things in Public Spaces: Initial Insights and Challenges
SEIS - Software Engineering in Society
Amna Batool Deakin University, Seng W.Loke Deakin University, Niroshinie Fernando Deakin University, Jonathan Kua Deakin University
15:38
2m
Short-paper
Workplace Discrimination in Software Engineering: Where We Stand Today
SEIS - Software Engineering in Society
Xin Zhao Seattle University, Riley Young Seattle University
15:40
2m
Talk
A GNN-based Recommender System to Assist the Specification of Metamodels and Models
Showcase
Juri Di Rocco University of L'Aquila, Claudio Di Sipio University of L'Aquila, Davide Di Ruscio University of L'Aquila, Phuong T. Nguyen University of L’Aquila
15:42
2m
Talk
ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis
Technical Track
Austin Mordahl University of Texas at Dallas, Zenong Zhang The University of Texas at Dallas, Dakota Soles The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas
Pre-print