4.6 Article

Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities

Journal

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
Volume 37, Issue 6, Pages 772-787

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TSE.2010.81

Keywords

Fault prediction; software metrics; software security; vulnerability prediction

Funding

  1. US National Science Foundation (NSF) [0716176, 0346903]
  2. US Army Research Office (ARO) [W911NF-08-1-0105]
  3. Direct For Computer & Info Scie & Enginr
  4. Division Of Computer and Network Systems [0716176] Funding Source: National Science Foundation
  5. Division of Computing and Communication Foundations
  6. Direct For Computer & Info Scie & Enginr [0346903] Funding Source: National Science Foundation

Ask authors/readers for more resources

Security inspection and testing require experts in security who think like an attacker. Security experts need to know code locations on which to focus their testing and inspection efforts. Since vulnerabilities are rare occurrences, locating vulnerable code locations can be a challenging task. We investigated whether software metrics obtained from source code and development history are discriminative and predictive of vulnerable code locations. If so, security experts can use this prediction to prioritize security inspection and testing efforts. The metrics we investigated fall into three categories: complexity, code churn, and developer activity metrics. We performed two empirical case studies on large, widely used open-source projects: the Mozilla Firefox web browser and the Red Hat Enterprise Linux kernel. The results indicate that 24 of the 28 metrics collected are discriminative of vulnerabilities for both projects. The models using all three types of metrics together predicted over 80 percent of the known vulnerable files with less than 25 percent false positives for both projects. Compared to a random selection of files for inspection and testing, these models would have reduced the number of files and the number of lines of code to inspect or test by over 71 and 28 percent, respectively, for both projects.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available