Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities
Software composition analysis (SCA) tools have been widely adopted to identify vulnerable libraries used in software applications. Such SCA tools depend on a vulnerability database to know affected libraries of each vulnerability. However, it is labor-intensive and error-prone for a security team to manually maintain the vulnerability database. While several approaches adopt extreme multi-label learning to predict affected libraries for vulnerabilities, they are practically ineffective due to the limited library labels and the unawareness of ecosystems.
To address these problems, we first conduct an empirical study to assess the quality of two fields, i.e., affected libraries and their ecosystems, for four vulnerability databases. Our study reveals notable inconsistencies and inaccuracies in these two fields. Then, we propose Holmes to identify affected libraries and their ecosystems for vulnerabilities via a learning-to-rank technique. The key idea of Holmes is to gather various evidences about affected libraries and their ecosystems from multiple sources, and learn to rank a pool of libraries based on their relevance to evidences. Our extensive experiments have shown the effectiveness, efficiency and usefulness of Holmes.
Fri 19 AprDisplayed time zone: Lisbon change
11:00 - 12:30 | Security 4Research Track / Software Engineering in Practice at Eugénio de Andrade Chair(s): Liliana Pasquale University College Dublin & Lero | ||
11:00 15mTalk | A User-centered Security Evaluation of Copilot Research Track Owura Asare University of Waterloo, Mei Nagappan University of Waterloo, N. Asokan University of Waterloo | ||
11:15 15mTalk | Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities Research Track Susheng Wu Fudan University, Wenyan Song Fudan University, Kaifeng Huang Tongji University, Bihuan Chen Fudan University, Xin Peng Fudan University | ||
11:30 15mTalk | Understanding Transaction Bugs in Database Systems Research Track Ziyu Cui Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Dong Wang Institute of software, Chinese academy of sciences, Jiansen Song Institute of Software Chinese Academy of Sciences, Yingying Zheng Institute of Software Chinese Academy of Sciences, Tao Wang Institute of Software at Chinese Academy of Sciences, Rui Yang Institute of Software, Chinese Academy of Sciences, Kang Xu University of Chinese Academy of Sciences, Nanjing, Yixin Hu Sun Yat-sen University, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print | ||
11:45 15mTalk | When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs Research Track Jiashuo Zhang Peking University, China, Jiachi Chen Sun Yat-sen University, Zhiyuan Wan Zhejiang University, Ting Chen University of Electronic Science and Technology of China, Jianbo Gao Peking University, Zhong Chen | ||
12:00 15mTalk | Industrial Challenges in Secure Continuous Development Software Engineering in Practice Fabiola Moyón Siemens Technology and Technical University of Munich, Florian Angermeir fortiss GmbH, Daniel Mendez Blekinge Institute of Technology and fortiss Pre-print | ||
12:15 15mTalk | Automated Security Findings Management: A Case Study in Industrial DevOps Software Engineering in Practice Markus Voggenreiter Siemens Technology / LMU Munich, Florian Angermeir fortiss GmbH, Fabiola Moyón Siemens Technology and Technical University of Munich, Ulrich Schöpp fortiss GmbH, Pierre Bonvin Munich University of Applied Sciences Pre-print |