2013
DOI: 10.1016/s1361-3723(13)70045-9
|View full text |Cite
|
Sign up to set email alerts
|

Using complexity metrics to improve software security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
30
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(32 citation statements)
references
References 11 publications
2
30
0
Order By: Relevance
“…Overall, codes of the participant teachers were of higher quality comparing to the students' codes; however with regards to the measurable security features, the opposite was observed. In recent years, much attention has been put on exploring the relations between software quality metrics and software vulnerability; most of these studies have found that the former can predict the latter (e.g., Chowdhurry & Zulkernine, 2011;Moshtari, Sami, & Azimi, 2013;Shin & Williams, 2013). However, most of these studies were analysing big (in terms of code size) commercial software (e.g., Mozilla Firefox, Linux Kernel, Eclipse, etc.)…”
Section: Discussionmentioning
confidence: 99%
“…Overall, codes of the participant teachers were of higher quality comparing to the students' codes; however with regards to the measurable security features, the opposite was observed. In recent years, much attention has been put on exploring the relations between software quality metrics and software vulnerability; most of these studies have found that the former can predict the latter (e.g., Chowdhurry & Zulkernine, 2011;Moshtari, Sami, & Azimi, 2013;Shin & Williams, 2013). However, most of these studies were analysing big (in terms of code size) commercial software (e.g., Mozilla Firefox, Linux Kernel, Eclipse, etc.)…”
Section: Discussionmentioning
confidence: 99%
“…Moshtari et al [20], contrary to previous studies, examined and highlighted the ability of software complexity to predict vulnerabilities between software products (i.e. cross-project prediction), based on 5 open-source software products, namely Mozilla Firefox, Linux Kernel, Apache Tomcat, Eclipse, and Open SCADA.…”
Section: Vulnerability Prediction Modelingmentioning
confidence: 99%
“…Although it is a relatively new area of research, a great number of VPMs has already been proposed in the related literature. As stated in [9], the main VPMs that can be found in the literature utilize software metrics [13][14][15][16][17][18][19][20][21][22], text mining [23][24][25][26][27][28], and security-related static analysis alerts [10,[29][30][31][32]] to predict vulnerabilities. These types of VPMs are analyzed in the rest of this section.…”
Section: Vulnerability Prediction Modelingmentioning
confidence: 99%
“…Metric-based techniques, inspired by bug prediction [16,28,30,38,46,49,78], leverage supervised or unsupervised machine learning to predict vulnerable code mostly at the granularity level of a source file. Following security experts' belief that complexity is the enemy of software security [40], they use complexity metrics [21,44,45,55,56] as features, or combine them with code churn metrics [26,54,58], token frequency metrics [31,52,65,79], dependency metrics [43,47,48,81], developer activity metrics [54,58] and execution complexity metrics [57]. On the other hand, pattern-based techniques leverage patterns of known vulnerabilities to identify potentially vulnerable code through static analysis.…”
Section: Introductionmentioning
confidence: 99%