Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities

نویسندگان

چکیده

Software reuse is a widely adopted practice among both researchers and practitioners. The relation between security can go ways: system become more secure by relying on mature dependencies, or insecure exposing larger attack surface via exploitable dependencies. To follow up previous study shed light this subject, we further examine the association software threats. In particular, empirically investigate 1244 open-source projects in multiple-case to explore discuss distribution of vulnerabilities code created development team reused through For that, consider potential vulnerabilities, as assessed static analysis, disclosed reported public databases. results suggest that size are associated with an increase amount native code. Moreover, found strong correlation higher number dependencies vulnerabilities. Based our empirical investigation, it appears source neither silver bullet combat nor frightening werewolf entail excessive them.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gene Silencing CUTs Both Ways

There is extensive transcription throughout the eukaryotic genome resulting in both antisense transcripts from coding regions and cryptic unstable transcripts (CUTs) from intergenic regions. In this issue, Camblong et al. (2007) demonstrate in the budding yeast that antisense transcripts, if stabilized by exosome impairment, are able to mediate gene silencing via the recruitment of histone deac...

متن کامل

Competition and patching of security vulnerabilities: An empirical analysis

0167-6245/$ see front matter 2009 Elsevier B.V doi:10.1016/j.infoecopol.2009.10.002 * Corresponding author. E-mail addresses: [email protected] (A [email protected] (C. Forman), anand_nandkum kumar), [email protected] (R. Telang). We empirically estimate the effect of competition on vendor patching of software defects by exploiting variation in number of vendors that share a common fl...

متن کامل

IKK cuts both ways in Huntington's disease

Opposing motors take the strain M olecular motors show an odd sense of teamwork during cargo transport, say Ally et al. In order to get somewhere, they have to pull in opposite directions. Many types of cargo move through the cell along micro-tubules, but rather than smoothly gliding to their fi nal destinations, they stutter back and forth due to motor proteins that pull in opposite directions...

متن کامل

C. elegans Aging: Proteolysis Cuts Both Ways

Recent reports from two laboratories working on the nematode Caenorhabditis elegans have identified both positive and negative roles for ubiquitin-mediated proteolysis in the regulation of longevity by the insulin/insulin-like growth factor signaling pathway.

متن کامل

Security of open source and closed source software: An empirical comparison of published vulnerabilities

Reviewing literature on open source and closed source security reveals that the discussion is often determined by biased attitudes toward one of these development styles. The discussion specifically lacks appropriate metrics, methodology and hard data. This paper contributes to solving this problem by analyzing and comparing published vulnerabilities of eight open source software and nine close...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Systems and Software

سال: 2021

ISSN: ['0164-1212', '1873-1228']

DOI: https://doi.org/10.1016/j.jss.2020.110653