2018
DOI: 10.1016/j.infsof.2018.06.005
|View full text |Cite
|
Sign up to set email alerts
|

A case study on software vulnerability coordination

Abstract: Context: Coordination is a fundamental tenet of software engineering. Coordination is required also for identifying discovered and disclosed software vulnerabilities with Common Vulnerabilities and Exposures (CVEs). Motivated by recent practical challenges, this paper examines the coordination of CVEs for open source projects through a public mailing list. Objective: The paper observes the historical time delays between the assignment of CVEs on a mailing list and the later appearance of these in the National … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 94 publications
0
13
0
Order By: Relevance
“…Bug fixing times are a classical topic in software engineering. Although not all bugs found by fuzzing are security bugs, previous results generally indicate that also security bugs often take a surprisingly long time to fix in many different contexts [15], [16]. Some bugs are never fixed even though these have been recognized as vulnerabilities [17].…”
Section: Research Design a Research Questionsmentioning
confidence: 96%
See 2 more Smart Citations
“…Bug fixing times are a classical topic in software engineering. Although not all bugs found by fuzzing are security bugs, previous results generally indicate that also security bugs often take a surprisingly long time to fix in many different contexts [15], [16]. Some bugs are never fixed even though these have been recognized as vulnerabilities [17].…”
Section: Research Design a Research Questionsmentioning
confidence: 96%
“…For instance, different memory management bugs (such as CWE-415 and CWE-416) could be assumed to yield faster fixing times compared to stalls and deadlocks that are usually difficult to debug especially in the kernel development context. In general, a similar rationale applies to the coordination of CVE identifiers and vulnerabilities in general [16]. Of course, testing and reviewing take time, and thus RQ.3b implies a clear-cut hypothesis.…”
Section: Research Design a Research Questionsmentioning
confidence: 98%
See 1 more Smart Citation
“…The examples include hosting services, blogs, company websites, bug trackers, bug bounty platforms, so-called pastebins, other databases, media outlets, online archives, and personal homepages. Taken together, these diverse sources are a good example on the practical challenges for current vulnerability tracking [28]. Such practical challenges also translate into research challenges: mining a single software repository (or a few repositories, for that matter) is assuredly inadequate for empirically observing most known software (plugin) vulnerabilities.…”
Section: Overviewmentioning
confidence: 99%
“…With the rapid development of information technology, software system and its vulnerabilities have become a widespread concern for developers [1][2][3][4]. Software vulnerabilities are defects in software's specific implementation or system security policy, which can enable attackers to access or damage the system without authorization.…”
Section: Introductionmentioning
confidence: 99%