Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies

Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Vulnerable dependencies are a known problem in today's free open-source software ecosystems because FOSS libraries are highly interconnected, and developers do not always update their dependencies. Our paper proposes Vuln4Real, the methodology for counting actually vulnerable dependencies, that addresses the over-inflation problem of academic and industrial approaches for reporting vulnerable dependencies in FOSS software, and therefore, caters to the needs of industrial practice for correct allocation of development and audit resources. To understand the industrial impact of a more precise methodology, we considered the 500 most popular FOSS Java libraries used by SAP in its own software. Our analysis included 25767 distinct library instances in Maven. We found that the proposed methodology has visible impacts on both ecosystem view and the individual library developer view of the situation of software dependencies: Vuln4Real significantly reduces the number of false alerts for deployed code (dependencies wrongly flagged as vulnerable), provides meaningful insights on the exposure to third-parties (and hence vulnerabilities) of a library, and automatically predicts when dependency maintenance starts lagging, so it may not receive updates for arising issues.

Original languageEnglish
Pages (from-to)1592-1609
JournalIEEE Transactions on Software Engineering
Volume48
Issue number5
DOIs
Publication statusAccepted/In press - 2020
Externally publishedYes

Bibliographical note

Publisher Copyright:
IEEE

Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.

Funding

FundersFunder number
Horizon 2020 Framework Programme830929

    Keywords

    • Ecosystems
    • Free Open Source Software
    • Java
    • Libraries
    • Mining Software Repositories
    • Open source software
    • Security
    • Tools
    • Vulnerable Dependency

    Fingerprint

    Dive into the research topics of 'Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies'. Together they form a unique fingerprint.

    Cite this