Proceedings of the 3rd ACM SIGSOFT International Workshop on Software Security From Design to Deployment 2020
DOI: 10.1145/3416507.3423190
|View full text |Cite
|
Sign up to set email alerts
|

Towards automated, provenance-driven security audit for git-based repositories: applied to germany's corona-warn-app: vision paper

Abstract: Software repositories contain information about source code, software development processes, and team interactions. We combine provenance of the development process with code security analysis to automatically discover insights. This provides fast feedback on the software's design and security issues, which we evaluate on projects that are developed under time pressure, such as Germany's COVID-19 contact tracing app 'Corona-Warn-App'. CCS CONCEPTS • Security and privacy → Software security engineering; • Softw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…We already work on using the provenance data for non-visual analytics of open-source projects. For example, to investigate whether vulnerabilities are introduced by external contributors (e.g., via pull requests)-we apply static code analysis for revisions in development history determined on the provenance data [23].…”
Section: Discussionmentioning
confidence: 99%
“…We already work on using the provenance data for non-visual analytics of open-source projects. For example, to investigate whether vulnerabilities are introduced by external contributors (e.g., via pull requests)-we apply static code analysis for revisions in development history determined on the provenance data [23].…”
Section: Discussionmentioning
confidence: 99%
“…It must, however, be noted that although the population download rates of the CTA in Germany remains relatively low (Amann et al, 2021;Zimmermann et al, 2021;Blom et al, 2021), Munzert et al (2021) suggest that considerable awareness of the app was generated and the provision of monetary incentives for downloading the app might be more effective than further awareness-raising. Also, the government has been hailed for its open-source approach, which enables public scrutiny of the apps source code and increased transparency (Sonnekalb et al, 2020;Amann et al, 2021;Weiß et al, 2021). However, Grill et al (2021) argue there has been a 'missed communication opportunity' because many non-users are not aware of the usefulness and effectiveness of the app, and, the government has been criticised for the lack of transparency and clear communication about its purpose and function (Amann et al, 2021).…”
Section: Germanymentioning
confidence: 99%
“…The basic principle of our provenance-driven code security analysis is to find and select relevant or "interesting" activities in the development process by making queries on provenance information and then evaluating the results of static code analysis at the times of these activities [25,27].…”
Section: Introductionmentioning
confidence: 99%