The beauty and the beast: vulnerabilities in red hat’s packages

  • Authors:
  • Stephan Neuhaus;Thomas Zimmermann

  • Affiliations:
  • Dipartimento di Informatica e Telecomunicazioni, Università degli Studi di Trento, Trento, Italy;Microsoft Research, One Microsoft Way, Redmond, Washington

  • Venue:
  • USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In an empirical study of 3241 Red Hat packages, we show that software vulnerabilities correlate with dependencies between packages. With formal concept analysis and statistical hypothesis testing, we identify dependencies that decrease the risk of vulnerabilities ("beauties") or increase the risk ("beasts"). Using support vector machines on dependency data, our prediction models successfully and consistently catch about two thirds of vulnerable packages (median recall of 0.65). When our models predict a package as vulnerable, it is correct more than eight times out of ten (median precision of 0.83). Our findings help developers to choose new dependencies wisely and make them aware of risky dependencies.