Background: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies. Aim: Our paper addresses the over-inflation problem of academic and industrial approaches for reporting vulnerable dependencies in OSS software, and therefore, caters to the needs of industrial practice for correct allocation of development and audit resources. Method: Careful analysis of deployed dependencies, aggregation of dependencies by their projects, and distinction of halted dependencies allow us to obtain a counting method that avoids over-inflation. To understand the industrial impact of a more precise approach, we considered the 200 most popular OSS Java libraries used by SAP in its own software. Our analysis included 10905 distinct GAVs (group, artifact, version) in Maven when considering all the library versions. Results: We found that about 20% of the dependencies affected by a known vulnerability are not deployed, and therefore, they do not represent a danger to the analyzed library because they cannot be exploited in practice. Developers of the analyzed libraries are able to fix (and actually responsible for) 82% of the deployed vulnerable dependencies. The vast majority (81%) of vulnerable dependencies may be fixed by simply updating to a new version, while 1% of the vulnerable dependencies in our sample are halted, and therefore, potentially require a costly mitigation strategy. Conclusions: Our case study shows that the correct counting allows software development companies to receive actionable information about their library dependencies, and therefore, correctly allocate costly development and audit resources, which is spent inefficiently in case of distorted measurements.
Vulnerable Open Source Dependencies: Counting Those That Matter / Pashchenko, Ivan; Plate, Henrik; Ponta, Serena Elisa; Sabetta, Antonino; Massacci, Fabio. - (2018), pp. 1-10. ((Intervento presentato al convegno ESEM tenutosi a Oulu, Finland nel 11/10/2018.
Scheda prodotto non validato
I dati visualizzati non sono stati ancora sottoposti a validazione formale da parte dello Staff di IRIS, ma sono stati ugualmente trasmessi al Sito Docente Cineca (Loginmiur).
|Titolo:||Vulnerable Open Source Dependencies: Counting Those That Matter|
|Autori:||Pashchenko, Ivan; Plate, Henrik; Ponta, Serena Elisa; Sabetta, Antonino; Massacci, Fabio|
|Titolo del volume contenente il saggio:||12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement|
|Luogo di edizione:||Oulu, Finland|
|Anno di pubblicazione:||2018|
|Citazione:||Vulnerable Open Source Dependencies: Counting Those That Matter / Pashchenko, Ivan; Plate, Henrik; Ponta, Serena Elisa; Sabetta, Antonino; Massacci, Fabio. - (2018), pp. 1-10. ((Intervento presentato al convegno ESEM tenutosi a Oulu, Finland nel 11/10/2018.|
|Appare nelle tipologie:||04.1 Saggio in atti di convegno (Paper in proceedings)|