Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities | IEEE Journals & Magazine | IEEE Xplore

Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities


Abstract:

Security inspection and testing require experts in security who think like an attacker. Security experts need to know code locations on which to focus their testing and i...Show More

Abstract:

Security inspection and testing require experts in security who think like an attacker. Security experts need to know code locations on which to focus their testing and inspection efforts. Since vulnerabilities are rare occurrences, locating vulnerable code locations can be a challenging task. We investigated whether software metrics obtained from source code and development history are discriminative and predictive of vulnerable code locations. If so, security experts can use this prediction to prioritize security inspection and testing efforts. The metrics we investigated fall into three categories: complexity, code churn, and developer activity metrics. We performed two empirical case studies on large, widely used open-source projects: the Mozilla Firefox web browser and the Red Hat Enterprise Linux kernel. The results indicate that 24 of the 28 metrics collected are discriminative of vulnerabilities for both projects. The models using all three types of metrics together predicted over 80 percent of the known vulnerable files with less than 25 percent false positives for both projects. Compared to a random selection of files for inspection and testing, these models would have reduced the number of files and the number of lines of code to inspect or test by over 71 and 28 percent, respectively, for both projects.
Published in: IEEE Transactions on Software Engineering ( Volume: 37, Issue: 6, Nov.-Dec. 2011)
Page(s): 772 - 787
Date of Publication: 02 September 2010

ISSN Information:


Contact IEEE to Subscribe

References

References is not available for this document.