Analyzing the Evolution of Source Code to Predict Vulnerabilities

Kalana Ranasinghe,Chamath Keppitiyagama

2022 22nd International Conference on Advances in ICT for Emerging Regions (ICTer)(2022)

引用 0|浏览3
暂无评分
摘要
Even though there are numerous prior studies concentrating on finding and forecasting vulnerability, the research community have less attention to the aftermath of vulnerability remedies represented in a code. Our primary goal was to understand better what happens to source code following vulnerability remediation via source code and repository analysis. For this research, primarily two distinct data sets were constructed. A dataset containing vulnerability fixes data and a dataset with the data related to the bug fixes. In this context, we have defined the vulnerabilities as the entries that are associated with Common Weakness Enumeration(CWE) entries. Accordingly, in our research, we examined the 80 most popular open-source javascript-based repositories, which contained more than 401K commits, to conduct a timeline analysis based on vulnerability fixes and introductions. Based on these commits, we have extracted source files and generated corresponding Abstract Syntax Tree (AST) for each file. Following that, we have introduced a way to calculate an entropy value on AST and a simple algorithm to identify a significant instance based on that value. Moreover, we have shown that fixing a vulnerability in code makes a considerable change in the code AST than a bug fix by carrying out hypothesis testing. Additionally, we demonstrated that code churn significantly increases following the vulnerability fix.
更多
查看译文
关键词
Software Security,Abstract Syntax Tree,Entropy,Vulnerability Analysis,Software Repository Mining
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要