Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision
In today’s software development landscape, the use of third-party libraries is near-ubiquitous; leveraging third-party libraries can significantly accelerate development, allowing teams to implement complex functionalities without reinventing the wheel. However, one significant cost of reusing code is security vulnerabilities. Vulnerabilities in third-party libraries have allowed attackers to breach databases, conduct identity theft, steal sensitive user data, and launch mass phishing campaigns. Notorious examples of vulnerabilities in libraries from the past few years include log4shell, solarwinds, event-stream, lodash, and equifax.
Existing software composition analysis (SCA) tools track the propagation of vulnerabilities from libraries through dependencies to downstream clients and alert those clients. Due to their design, many existing tools are highly imprecise—they create alerts for clients even when the flagged vulnerabilities are not exploitable.
Library developers occasionally release new versions of their software with refactorings that improve modularity. In this work, we explore the impacts of modularity improvements on vulnerability detection. In addition to generally improving the nonfunctional properties of the code, refactoring also has several security-related beneficial side effects: (1) it improves the precision of existing (fast and stable) SCAs; and (2) it protects from vulnerabilities that are exploitable when the vulnerable code is present and not even reachable, as in gadget chain attacks.
Our primary contribution is thus to quantify, using a novel simulation-based counterfactual vulnerability analysis, two main ways that improved modularity can boost security. We propose a modularization method using a DAG partitioning algorithm, and statically measure properties of systems that we (synthetically) modularize. In our experiments, we find that modularization can improve precision of Software Composition Analysis (SCA) tools to 71%, up from 35%. Furthermore, migrating to modularized libraries results in 78% of clients no longer being vulnerable to attacks referencing inactive dependencies. We further verify that the results of our modularization reflect the structures that are already implicit in the projects (but for which no modularity boundaries are enforced).
Mon 7 OctDisplayed time zone: Arizona change
15:30 - 17:00 | |||
15:30 16mResearch paper | Enhancing Recommendations of Composite Refactorings based on the Practice Research Track Ana Carla Bibiano Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Anderson Uchôa Federal University of Ceará, Daniel Tenório Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Baldoino Fonseca Federal University of Alagoas (UFAL), Márcio Ribeiro Federal University of Alagoas, Brazil, Thelma Elita Colanzi State University of Maringa, Brazil, Audrey Vasconcelos Federal University of Alagoas (UFAL), Rafael de Mello UFRJ, Brazil | ||
15:47 16mResearch paper | The Hidden Costs of Automation: An Empirical Study on GitHub Actions Workflow Maintenance Research Track Pablo Valenzuela-Toledo University of Bern, Universidad de La Frontera, Alexandre Bergel University of Chile, Oscar Nierstrasz feenk.com, Timo Kehrer University of Bern Pre-print | ||
16:04 16mResearch paper | Enhancing Identifier Naming Through Multi-Mask Fine-tuning of Language Models of CodeResearch Object ReviewedOpen Research Object Research Track Sanidhya Vijayvargiya BITS Pilani Hyderabad Campus, Mootez Saad Dalhousie University, Tushar Sharma Dalhousie University Pre-print | ||
16:21 16mResearch paper | Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision Research Track Mohammad Mahdi Abdollahpour University of Waterloo, Jens Dietrich Victoria University of Wellington, Patrick Lam University of Waterloo Pre-print | ||
16:40 20mLive Q&A | Discussion (Maintainance) Research Track |