2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM) 2016
DOI: 10.1109/scam.2016.15
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Prediction Models: A Case Study on the Linux Kernel

Abstract: Abstract-To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at making a reliable replication and comparison of the main vulnerability prediction models. Thus, we seek for determining their effectiveness, i.e., their ability to distinguish between vulnerable and non-vulnerable components, in the context of the Linux Kernel, under different scenarios. To achieve the abo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(30 citation statements)
references
References 23 publications
0
30
0
Order By: Relevance
“…Jimenez et al [22] carried out an empirical study comparing the vulnerability prediction approaches using a dataset of 743 vulnerabilities from the Linux Kernel (which was split into independent training and evaluation data sets) and found that function calls and text mining were the best performing approaches. Although related, Jimenez et al used a commit-based analysis for only one system (while herein we use a release-based one for three systems) and does not investigate the impact of data leakage.…”
Section: Related Workmentioning
confidence: 99%
“…Jimenez et al [22] carried out an empirical study comparing the vulnerability prediction approaches using a dataset of 743 vulnerabilities from the Linux Kernel (which was split into independent training and evaluation data sets) and found that function calls and text mining were the best performing approaches. Although related, Jimenez et al used a commit-based analysis for only one system (while herein we use a release-based one for three systems) and does not investigate the impact of data leakage.…”
Section: Related Workmentioning
confidence: 99%
“…Although it is a relatively new area of research, a great number of VPMs has already been proposed in the related literature. As stated in [9], the main VPMs that can be found in the literature utilize software metrics [13][14][15][16][17][18][19][20][21][22], text mining [23][24][25][26][27][28], and security-related static analysis alerts [10,[29][30][31][32]] to predict vulnerabilities. These types of VPMs are analyzed in the rest of this section.…”
Section: Vulnerability Prediction Modelingmentioning
confidence: 99%
“…Finally, different empirical studies have shown that text mining-based models exhibit better predictive performance in comparison to other state-of-the-art techniques [9,33,34]. However, they perform poorly in cross-project prediction, which indicates that they are highly projectspecific [33], while excessive amount of time and memory is required for their construction and regular application [9,34].…”
Section: Vulnerability Prediction Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with the other vulnerability analysis techniques (e.g., [11,12]), VPM is used as a guidance before security testing. At present, a lot of VPMs have been proposed [6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Software metrics are utilized as features in these VPMs, and the training data are obtained from public vulnerabilities database.…”
Section: Introductionmentioning
confidence: 99%