On the effects of program slicing for vulnerability detection during code inspection

Aurora Papotti*, Katja Tuma, Fabio Massacci

*Corresponding author for this work

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Slicing is a fault localization technique that has been proposed to support debugging and program comprehension. Yet, its empirical effectiveness during code inspection by humans has received limited attention. The goal of our study is two-fold. First, we aim to define what it means for a code reviewer to identify the vulnerable lines correctly. Second, we investigate whether reducing the number of to-be-inspected lines by method-level slicing supports code reviewers in detecting security vulnerabilities. We propose a novel approach based on the notion of a δ-neighborhood (intuitively based on the idea of the context size of the command git diff) to define correctly identified lines. Then, we conducted a multi-year controlled experiment (2017-2023) in which MSc students attending security courses (n=236) were tasked with identifying vulnerable lines in original or sliced Java files from Apache Tomcat. We provide perfect seed lines for a slicing algorithm to control for confounding factors. Each treatment differs in the pair (Vulnerability, Original/Sliced) with a balanced design with vulnerabilities from the OWASP Top 10 2017: A1 (Injection), A5 (Broken Access Control), A6 (Security Misconfiguration), and A7 (Cross-Site Scripting). To generate smaller slices for human consumption, we used a variant of intra-procedural thin slicing. We report the results for δ=0 which corresponds to exactly matching the vulnerable ground truth lines, and δ=3 which represents the scenario of identifying the vulnerable area. For both cases, we found that slicing helps in ‘finding something’ (the participant has found at least some vulnerable lines) as opposed to ‘finding nothing’. For the case of δ=0 analyzing a slice and analyzing the original file are statistically equivalent from the perspective of lines found by those who found something. With δ=3 slicing helps to find more vulnerabilities compared to analyzing an original file, as we would normally expect. Given the type of population, additional experiments are necessary to be generalized to experienced developers.

Original languageEnglish
Article number93
Pages (from-to)1-37
Number of pages37
JournalEmpirical Software Engineering
Volume30
Issue number3
Early online date5 Apr 2025
DOIs
Publication statusPublished - May 2025

Bibliographical note

Publisher Copyright:
© The Author(s) 2025.

Keywords

  • code review
  • controlled experiment
  • program comprehension
  • program slicing
  • vulnerability

Fingerprint

Dive into the research topics of 'On the effects of program slicing for vulnerability detection during code inspection'. Together they form a unique fingerprint.

Cite this