iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1145/2184512.2184604
High false positive detection of security vulnerabilities | Proceedings of the 50th annual ACM Southeast Conference skip to main content
10.1145/2184512.2184604acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
poster

High false positive detection of security vulnerabilities: a case study

Published: 29 March 2012 Publication History

Abstract

Static code analysis is an emerging technique for secure software development that analyzes large software code bases without execution to reveal potential vulnerabilities present in the code. These vulnerabilities include but are not limited to SQL injections, buffer overflows, cross site scripting, improper security settings, and information leakage.
Software developers can spend many man-hours to track and fix the flagged vulnerabilities. Surveys show that a high percentage of discovered vulnerabilities are actually false positives.
This paper presents a case study that found that context information regarding libraries could account for many of the false positives. We suggest future research incorporate context information into static analysis tools for security.

References

[1]
Austin, A. and Williams, L. 2011. One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques, In Proceedings of the 5th International Symposium on Empirical Software Engineering and Measurement (Banff, Canada, September 22-23, 2011). ESEM '11. CPS, Los Alamitos, CA, 97--106. DOI= http://dx.doi.org/10.1109/ESEM.2011.18.
[2]
Bessey, A., Block, K., Chelf, B., Chou, A., Fulton, B., Hallem, S., Henri-Gros, C., Kamsky, A., McPeak S. and Engller, D. 2010. A few billion lines of code later: using static Analysis to find Bugs in the Real World, Communications of the ACM, 53, 2, (Feb. 2010), 66--75. DOI= http://dx.doi.org/10.1145/1646353.1646374
[3]
Zheng, J., Williams, L., Nagappan, N., Snipes, W., Hudepohl, J. P. and Vouk, M. A. 2006. On the Value of Static Analysis for Fault Detection in Software. IEEE Transactions on Software Engineering, 32, 4 (Apr. 2006), 240--253. DOI= http://dx.doi.org/10.1109/TSE.2006.38
[4]
Howard, M., LeBlanc, D., and Viega, J. 2005. 19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them, The McGraw-Hill, Emeryville, California, USA.
[5]
List of static code analysis tools; http://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis
[6]
FindBugs TM. Find bugs in Java Programs; http://findbugs.sourceforge.net/
[7]
The electronic Clinician Health Record; http://www.tolven.org/echr.html
[8]
Open EMR; http://www.oemr.org/

Cited By

View all
  • (2024)Assessment of Software Vulnerability Contributing Factors by Model-Agnostic Explainable AIMachine Learning and Knowledge Extraction10.3390/make60200506:2(1087-1113)Online publication date: 16-May-2024
  • (2024)A Comparative Study of Commit Representations for JIT Vulnerability PredictionComputers10.3390/computers1301002213:1(22)Online publication date: 11-Jan-2024
  • (2024)FuzzSlice: Pruning False Positives in Static Analysis Warnings through Function-Level FuzzingProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623321(1-13)Online publication date: 20-May-2024
  • Show More Cited By

Index Terms

  1. High false positive detection of security vulnerabilities: a case study

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ACMSE '12: Proceedings of the 50th annual ACM Southeast Conference
      March 2012
      424 pages
      ISBN:9781450312035
      DOI:10.1145/2184512
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 March 2012

      Check for updates

      Author Tags

      1. FindBugs
      2. false positives detections
      3. secure software development
      4. security
      5. static code analysis
      6. vulnerabilities

      Qualifiers

      • Poster

      Conference

      ACM SE '12
      Sponsor:
      ACM SE '12: ACM Southeast Regional Conference
      March 29 - 31, 2012
      Alabama, Tuscaloosa

      Acceptance Rates

      ACMSE '12 Paper Acceptance Rate 28 of 56 submissions, 50%;
      Overall Acceptance Rate 502 of 1,023 submissions, 49%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Assessment of Software Vulnerability Contributing Factors by Model-Agnostic Explainable AIMachine Learning and Knowledge Extraction10.3390/make60200506:2(1087-1113)Online publication date: 16-May-2024
      • (2024)A Comparative Study of Commit Representations for JIT Vulnerability PredictionComputers10.3390/computers1301002213:1(22)Online publication date: 11-Jan-2024
      • (2024)FuzzSlice: Pruning False Positives in Static Analysis Warnings through Function-Level FuzzingProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623321(1-13)Online publication date: 20-May-2024
      • (2023)Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and OpportunitiesIEEE Transactions on Software Engineering10.1109/TSE.2023.332966749:12(5154-5188)Online publication date: 2-Nov-2023
      • (2023)Using software metrics for predicting vulnerable classes in java and python based systemsInformation Security Journal: A Global Perspective10.1080/19393555.2023.224034333:3(251-267)Online publication date: 28-Jul-2023
      • (2022)Using a Semantic Knowledge Base to Improve the Management of Security Reports in Industrial DevOps Projects2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)10.1109/ICSE-SEIP55303.2022.9794072(309-310)Online publication date: May-2022
      • (2021)Using software metrics for predicting vulnerable classes and methods in Java projectsJournal of Software: Evolution and Process10.1002/smr.230333:3Online publication date: 3-Mar-2021
      • (2019)Challenges with responding to static analysis tool alertsProceedings of the 16th International Conference on Mining Software Repositories10.1109/MSR.2019.00049(245-249)Online publication date: 26-May-2019
      • (2017)Identifying and documenting false positive patterns generated by static code analysis toolsProceedings of the 4th International Workshop on Software Engineering Research and Industrial Practice10.1109/SER-IP.2017..20(55-61)Online publication date: 20-May-2017
      • (2016)Exploring context-sensitive data flow analysis for early vulnerability detectionJournal of Systems and Software10.1016/j.jss.2015.12.021113:C(337-361)Online publication date: 1-Mar-2016
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media