首页> 外文会议>Asia-Pacific Software Engineering Conference >An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel
【24h】

An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel

机译:对OpenSSL和Linux内核中漏洞的实证分析

获取原文

摘要

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify many of them with severe consequences. Vulnerabilities are hard to discover since they appear in various forms, caused by many different issues and their identification requires an attacker's mindset. In this paper, we aim at increasing the understanding of vulnerabilities by investigating their characteristics on two major open-source software systems, i.e., the Linux kernel and OpenSSL. In particular, we seek to analyse and build a profile for vulnerable code, which can ultimately help researchers in building automated approaches like vulnerability prediction models. Thus, we examine the location, criticality and category of vulnerable code along with its relation with software metrics. To do so, we collect more than 2,200 vulnerable files accounting for 863 vulnerabilities and compute more than 35 software metrics. Our results indicate that while 9 Common Weakness Enumeration (CWE) types of vulnerabilities are prevalent, only 3 of them are critical in OpenSSL and 2 of them in the Linux kernel. They also indicate that different types of vulnerabilities have different characteristics, i.e., metric profiles, and that vulnerabilities of the same type have different profiles in the two projects we examined. We also found that the file structure of the projects can provide useful information related to the vulnerabilities. Overall, our results demonstrate the need for making project specific approaches that focus on specific types of vulnerabilities.
机译:漏洞是从业人员在使用安全关键型应用程序时面临的主要问题之一。不幸的是,开发人员和安全团队,甚至是经验丰富的团队,都无法识别其中许多具有严重后果的东西。漏洞很难发现,因为它们以多种形式出现,是由许多不同的问题引起的,而识别漏洞需要攻击者的心态。在本文中,我们旨在通过研究两个主要的开源软件系统(即Linux内核和OpenSSL)上的漏洞来增加对漏洞的了解。特别是,我们寻求分析和构建易受攻击代码的配置文件,这最终可以帮助研究人员构建诸如漏洞预测模型之类的自动化方法。因此,我们检查了易受攻击的代码的位置,重要性和类别,以及其与软件指标的关系。为此,我们收集了2200多个易受攻击的文件,说明了863个漏洞,并计算了35个以上的软件指标。我们的结果表明,虽然普遍存在9种常见的弱点枚举(CWE)类型的漏洞,但其中只有3种在OpenSSL中是关键的,而其中2种在Linux内核中是关键的。它们还表明,不同类型的漏洞具有不同的特征(即指标配置文件),并且在我们研究的两个项目中,相同类型的漏洞具有不同的配置文件。我们还发现,项目的文件结构可以提供与漏洞有关的有用信息。总体而言,我们的结果表明需要制定针对特定漏洞类型的项目特定方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号