Abstract

Context: Security bug reports are reports from bug tracking systems that include descriptions and resolutions of security vulnerabilities that occur in software projects. Researchers use security bug reports to conduct research related to software vulnerabilities. A mapping study of publications that use security bug reports can inform researchers on (i) the research topics that have been investigated, and (ii) potential research avenues in the field of software vulnerabilities. Objective: The objective of this paper is to help researchers identify research gaps related to software vulnerabilities by conducting a systematic mapping study of research publications that use security bug reports. Method: We perform a systematic mapping study of research that use security bug reports for software vulnerability research by searching five scholar databases: (i) IEEE Xplore, (ii) ACM Digital Library, (iii) ScienceDirect, (iv)Wiley Online Library, and (v) Springer Link. From the five scholar databases, we select 46 publications that use security bug reports by systematically applying inclusion and exclusion criteria. Using qualitative analysis, we identify research topics investigated in our collected set of publications. Results: We identify three research topics that are investigated in our set of 46 publications. The three topics are: (i) vulnerability classification; (ii) vulnerability report summarization; and (iii) vulnerability dataset construction. Of the studied 46 publications, 42 publications focus on vulnerability classification. Conclusion: Findings from our mapping study can be leveraged to identify research opportunities in the domains of software vulnerability classification and automated vulnerability repair techniques.

Highlights

  • News reports reveal the serious consequences of security vulnerabilities in software projects

  • Using Equation 1 reported in section IV-A, we record a quasi-sensitivity metric (QSM) score of 1.0 for the collected publications, which indicates that our search strings are capable of identifying publications that use security bug reports for software vulnerability research

  • ANSWER TO RQ4: WHAT AUTOMATED TECHNIQUES ARE USED IN PUBLICATIONS THAT USE SECURITY BUG REPORTS FOR SOFTWARE VULNERABILITY RESEARCH? We organize this section in two subsections: (i) first, we describe the techniques used in our set of 46 publications, and (ii) second, we describe how publications that belong to the three identified topics use the identified techniques

Read more

Summary

Introduction

News reports reveal the serious consequences of security vulnerabilities in software projects. In 2019, the ‘DELL PC Doctor’ vulnerability impacted millions of Dell computers [1] As another example, Experian, a consumer credit reporting service, experienced a security attack due to a vulnerability, affecting nearly 24 million South African customers and approximately 793,749 business organizations in August 2020.1 Since the beginning of 2020, more than 445 million cyberattacks have been reported, all of which exploited latent vulnerabilities.. Security bug reports are reports from bug tracking systems that include descriptions and resolutions of security vulnerabilities that occur in software projects. We provide background information on security bug reports and SMS . A. BACKGROUND ON SECURITY BUG REPORTS Security bug reports are reports from bug tracking systems that include descriptions and resolutions of security vulnerabilities that occur in software projects. A vulnerability is defined as a weakness in a software system, system security procedures, internal controls, or implementation that could be exploited by a malicious user.

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.