2019
DOI: 10.1109/tse.2018.2816033
|View full text |Cite
|
Sign up to set email alerts
|

A Screening Test for Disclosed Vulnerabilities in FOSS Components

Abstract: Abstract-Free and Open Source Software (FOSS) components are ubiquitous in both proprietary and open source applications. Each time a vulnerability is disclosed in a FOSS component, a software vendor using this component in an application must decide whether to update the FOSS component, patch the application itself, or just do nothing as the vulnerability is not applicable to the older version of the FOSS component used. This is particularly challenging for enterprise software vendors that consume thousands o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 49 publications
(130 reference statements)
0
14
0
Order By: Relevance
“…• If a patch to fix the vulnerability in the dependency exists use the code-base approach by Plate et al [18] and [29] to compare the nodes of the dependency tree of the version of interest to check whether one of them is affected • If no such fix exists report the vulnerability according to database approach (i.e., listed version in the vulnerability dataset).…”
Section: Table 3 Vuln4real Methodology Overviewmentioning
confidence: 99%
See 3 more Smart Citations
“…• If a patch to fix the vulnerability in the dependency exists use the code-base approach by Plate et al [18] and [29] to compare the nodes of the dependency tree of the version of interest to check whether one of them is affected • If no such fix exists report the vulnerability according to database approach (i.e., listed version in the vulnerability dataset).…”
Section: Table 3 Vuln4real Methodology Overviewmentioning
confidence: 99%
“…To avoid the false positive and false negative inflation introduced by name-based vulnerability matching ( [13], [14], [15]), we leverage on precise code-based approaches to vulnerability detection such as Ponta et al [6] and Dashevskyi et al [29]. Starting from known vulnerabilities disclosed in the NVD, advisories, bug tracking systems, etc., we manually identified and analyzed the commit fixing the vulnerability.…”
Section: Step 5: Identification Of Dependencies With Known Vulnerabilmentioning
confidence: 99%
See 2 more Smart Citations
“…. Unfortunately, MOSS prosumers cannot expect to systematically receive information about security flaws in the 3rd party components of their projects [E2.3]: the practices for reporting vulnerabilities vary across projects and ecosystems, and it is well-known that only a minor part is represented in de-facto vulnerability databases such as the NVD [38], which also suffer from poor accuracy [39], [40]. This makes it difficult for applications that depend on those components to understand the impact of the vulnerability and to correctly determine and compare mitigation strategies (e.g., whether upgrading to a more recent, non-vulnerable version of the component is urgent, or if an application-level change could effectively mitigate the vulnerability at hand and make a potentially expensive version update unnecessary [41]).…”
Section: A Continuous Validation Of Design's Securitymentioning
confidence: 99%