Predicting Attack-prone Components with Source Code Static Analyzers
نویسندگان
چکیده
Predicting Attack-prone Components with Source Code Static Analyzers Report Title No single vulnerability detection technique can identify all vulnerabilities in a software system. However, the vulnerabilities that are identified from a detection technique may be predictive of the residuals. We focus on creating and evaluating statistical models that predict the components that contain the highest risk residual vulnerabilities. The cost to find and fix faults grows with time in the software life cycle (SLC). A challenge with our statistical models is to make the predictions available early in the SLC to afford for cost-effective fortifications. Source code static analyzers (SCSA) are available during coding phase and are also capable of detecting code-level vulnerabilities. We use the code-level vulnerabilities identified by these tools to predict the presence of additional coding vulnerabilities and vulnerabilities associated with the design and operation of the software. The goal of this research is to reduce vulnerabilities from escaping into the field by incorporating source code static analysis warnings into statistical models that predict which components are most susceptible to attack. The independent variable for our statistical model is the count of security-related source SCSA warnings. We also include the following metrics as independent variables in our models to determine if additional metrics are required to increase the accuracy of the model: non-security SCSA warnings, code churn and size, the count of faults found manually during development, and the measure of coupling between components. The dependent variable is the count of vulnerabilities reported by testing and those found in the field.
منابع مشابه
Predicting Attack-prone Components with Internal Metrics
Extensive research has shown that reliability models based upon software metrics can be used to predict which components are faultand/or failure-prone early in the development process. In this research, we seek to parallel failure-prone component prediction with security models to predict which components are attack-prone. Security experts can use these models to make informed risk management d...
متن کاملModel-based test case generation for source code analyzers
Testing and verification are mandatory when it comes to creating quality software. In order to create a good testing environment, one needs to create a lot of test cases, and typically this is done by hand. This research will reduce the manual effort by creating a model-based test case generator for source code analyzers. Using this generator, creating a suite of test cases will become less eff...
متن کاملSAMATE and Evaluating Static Analysis Tools
We give some background on the Software Assurance Metrics And Tool Evaluation (SAMATE) project and our decision to work on static source code security analyzers. We give our experience bringing government, vendors, and users together to develop a specification and tests to evaluate such analyzers. We also present preliminary results of our study on whether such tools reduce vulnerabilities in p...
متن کاملOn the Relative Completeness of Bytecode Analysis Versus Source Code Analysis
We discuss the challenges faced by bytecode analyzers designed for code verification compared to similar analyzers for source code. While a bytecode-level analysis brings many simplifications, e.g., fewer cases, independence from source syntax, name resolution, etc., it also introduces precision loss that must be recovered either via preprocessing, more precise abstract domains, more precise tr...
متن کاملComparative Analysis of Random Forests with Statistical and Machine Learning Methods in Predicting Fault-Prone Classes
There are available metrics for predicting fault prone classes, which may help software organizations for planning and performing testing activities. This may be possible due to proper allocation of resources on fault prone parts of the design and code of the software. Hence, importance and usefulness of such metrics is understandable, but empirical validation of these metrics is always a great...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015