4.6 Article

Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 28471-28495

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3058067

Keywords

Security; Computer bugs; Software; Databases; Systematics; Libraries; Software engineering; Bug report; software security; survey; systematic mapping study; vulnerability

Funding

  1. National Science Foundation (NSF) [2026869]
  2. Cybersecurity Education, Research and Outreach Center (CEROC), Tennessee Technological University
  3. Direct For Computer & Info Scie & Enginr
  4. Division Of Computer and Network Systems [2026869] Funding Source: National Science Foundation

Ask authors/readers for more resources

This paper aims to help researchers identify research gaps related to software vulnerabilities by conducting a systematic mapping study of research publications that use security bug reports. The results reveal that vulnerability classification, vulnerability report summarization, and vulnerability dataset construction are the main research topics investigated in the collected publications. This mapping study can be used to identify research opportunities in the domains of software vulnerability classification and automated vulnerability repair techniques.
Context: Security bug reports are reports from bug tracking systems that include descriptions and resolutions of security vulnerabilities that occur in software projects. Researchers use security bug reports to conduct research related to software vulnerabilities. A mapping study of publications that use security bug reports can inform researchers on (i) the research topics that have been investigated, and (ii) potential research avenues in the field of software vulnerabilities. Objective: The objective of this paper is to help researchers identify research gaps related to software vulnerabilities by conducting a systematic mapping study of research publications that use security bug reports. Method: We perform a systematic mapping study of research that use security bug reports for software vulnerability research by searching five scholar databases: (i) IEEE Xplore, (ii) ACM Digital Library, (iii) ScienceDirect, (iv)Wiley Online Library, and (v) Springer Link. From the five scholar databases, we select 46 publications that use security bug reports by systematically applying inclusion and exclusion criteria. Using qualitative analysis, we identify research topics investigated in our collected set of publications. Results: We identify three research topics that are investigated in our set of 46 publications. The three topics are: (i) vulnerability classification; (ii) vulnerability report summarization; and (iii) vulnerability dataset construction. Of the studied 46 publications, 42 publications focus on vulnerability classification. Conclusion: Findings from our mapping study can be leveraged to identify research opportunities in the domains of software vulnerability classification and automated vulnerability repair techniques.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available