Towards understanding the security issues of Python programs
Python programming language has witnessed a steady increase in popularity over the past few decades. Renowned for its conciseness and readability, as well as its ease of learning and use, Python is widespread adoption has inevitably exposed it to a higher likelihood of encountering issues. Given that numerous code modifications exhibit repetitive and analogous patterns, an extensive examination of Python code fixing patterns becomes imperative. Among these patterns, security-related issues hold significant importance due to their heightened risks and potential for substantial impact. Consequently, conducting research on security-related matters assumes utmost significance.
In this paper, we conduct a thorough investigation to gain insights into the security issues prevalent in Python programs. Our approach involves collecting 413 popular open-source Python projects from GitHub and identifying 9,782 bug reports related to security concerns and their corresponding bug-fix commits. We employ automated clustering and manual summarization techniques, ultimately classifying them into 12 distinct categories, with six categories being of notable prevalence. We analyze the bug reports and commits within each high-frequency category, examining aspects such as severity, root causes, and employed fixing patterns. Leveraging the empirical findings, we discuss the broader implications drawn from the study and offer guidance to software developers, facilitating proactive avoidance of such issues in their projects.
Fri 20 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
11:00 - 13:00 | Keynote & Session1: Software Vulnerability and Security IResearch Track / Plenary Events at Cosmos 3A Chair(s): William Chu Tunghai University | ||
11:00 60mKeynote | Keynote 2: Coding with the Machine: Promises and Perils in AI-Driven Software Engineering Plenary Events Leon Moonen Simula Research Laboratory | ||
12:00 15mTalk | Towards understanding the security issues of Python programs Research Track Hongcheng Fan Nanjing University, di liu Jiangsu Police Institute, Jielun Wu Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Baowen Xu Nanjing University | ||
12:15 15mTalk | A Novel LLM Approach of Cybersecurity Threat Analysis and Response Research Track TIAN HU Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Shangyuan Zhuang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaorui Guo Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Jiyan Sun Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Yinlong Liu Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Wei Ma Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Hongchao Wang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaolingfeng Innovation Academy for Microsatellites of Chinese Academy of Science, zhangxiaojie Innovation Academy for Microsatellites of Chinese Academy of Science | ||
12:30 15mTalk | Measuring and Explaining the Effects of Android App Transformations in Online Malware Detection Research Track Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Xiaodong Zhang University of Chinese Academy of Science, Haoyu Wang Huazhong University of Science and Technology, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Liu Nanyang Technological University | ||
12:45 15mTalk | Leveraging Visible Widget Sizes for Detecting Repackaged Android Apps Research Track Pre-print |
Cosmos 3A is the first room in the Cosmos 3 wing.
When facing the main Cosmos Hall, access to the Cosmos 3 wing is on the left, close to the stairs. The area is accessed through a large door with the number “3”, which will stay open during the event.