The International Conference on Evaluation and Assessment in Software Engineering 2022 2022
DOI: 10.1145/3530019.3535304
|View full text |Cite
|
Sign up to set email alerts
|

On the Use of Refactoring in Security Vulnerability Fixes: An Exploratory Study on Maven Libraries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…The attack surface of the software system encompasses the entry, and exit points of a system, the data that is transmitted through these points, and the code that safeguards both the paths and the data [27]. The attack surface of software refers to the total number of potential entry points through which unauthorized users can attempt to input or extract data from a system or environment to compromise a system, application, device, or network [28], [29]. For example, Kurmus et al [30] highlighted that the presence of vulnerabilities in the Kernel can lead to security weaknesses and defects in various operating systems.…”
Section: B Attack Surface Of Software Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…The attack surface of the software system encompasses the entry, and exit points of a system, the data that is transmitted through these points, and the code that safeguards both the paths and the data [27]. The attack surface of software refers to the total number of potential entry points through which unauthorized users can attempt to input or extract data from a system or environment to compromise a system, application, device, or network [28], [29]. For example, Kurmus et al [30] highlighted that the presence of vulnerabilities in the Kernel can lead to security weaknesses and defects in various operating systems.…”
Section: B Attack Surface Of Software Systemsmentioning
confidence: 99%
“…Therefore, vulnerabilities that are associated with bypassing a restriction refer to situations where an unauthenticated party can gain access to services or read and manipulate files [50]. The study conducted by Ikegami et al [28] examined the application of refactoring techniques in addressing security vulnerabilities. The results revealed that the identified vulnerabilities within the 143 analyzed Maven libraries were successfully addressed through the implementation of refactoring techniques.…”
Section: E Effects Of Refactorings On Vulnerabilitiesmentioning
confidence: 99%