The life and death of statically detected vulnerabilities: An empirical study

  • Authors:
  • Massimiliano Di Penta;Luigi Cerulo;Lerina Aversano

  • Affiliations:
  • Dept. of Engineering, University of Sannio, Via Traiano, 82100 Benevento, Italy;Dept. of Biological and Environmental Studies, University of Sannio, Via Port'Arsa, 11 - 82100 Benevento, Italy;Dept. of Engineering, University of Sannio, Via Traiano, 82100 Benevento, Italy

  • Venue:
  • Information and Software Technology
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Vulnerable statements constitute a major problem for developers and maintainers of networking systems. Their presence can ease the success of security attacks, aimed at gaining unauthorized access to data and functionality, or at causing system crashes and data loss. Examples of attacks caused by source code vulnerabilities are buffer overflows, command injections, and cross-site scripting. This paper reports on an empirical study, conducted across three networking systems, aimed at observing the evolution and decay of vulnerabilities detected by three freely available static analysis tools. In particular, the study compares the decay of different kinds of vulnerabilities, characterizes the decay likelihood through probability density functions, and reports a quantitative and qualitative analysis of the reasons for vulnerability removals. The study is performed by using a framework that traces the evolution of source code fragments across subsequent commits.