Risk-based attack surface approximation: how much data is enough?
Title | Risk-based attack surface approximation: how much data is enough? |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | C. Theisen, K. Herzig, B. Murphy, L. Williams |
Conference Name | 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP) |
Date Published | May |
Keywords | attack surface, Computer bugs, Measurement, Microsoft Windows, Mozilla Firefox, prediction models, proactive security reviews, random sampling, RASA, risk-based attack surface approximation, security, security of data, software development lifecycle, software engineering, Software systems, Stack traces, test efforts |
Abstract | Proactive security reviews and test efforts are a necessary component of the software development lifecycle. Resource limitations often preclude reviewing the entire code base. Making informed decisions on what code to review can improve a team's ability to find and remove vulnerabilities. Risk-based attack surface approximation (RASA) is a technique that uses crash dump stack traces to predict what code may contain exploitable vulnerabilities. The goal of this research is to help software development teams prioritize security efforts by the efficient development of a risk-based attack surface approximation. We explore the use of RASA using Mozilla Firefox and Microsoft Windows stack traces from crash dumps. We create RASA at the file level for Firefox, in which the 15.8% of the files that were part of the approximation contained 73.6% of the vulnerabilities seen for the product. We also explore the effect of random sampling of crashes on the approximation, as it may be impractical for organizations to store and process every crash received. We find that 10-fold random sampling of crashes at a rate of 10% resulted in 3% less vulnerabilities identified than using the entire set of stack traces for Mozilla Firefox. Sampling crashes in Windows 8.1 at a rate of 40% resulted in insignificant differences in vulnerability and file coverage as compared to a rate of 100%. |
DOI | 10.1109/ICSE-SEIP.2017.9 |
Citation Key | 7965451 |
Refereed Designation | Refereed |
- RASA
- test efforts
- Stack traces
- Software systems
- software engineering
- software development lifecycle
- security of data
- security
- risk-based attack surface approximation
- attack surface
- random sampling
- proactive security reviews
- prediction models
- Mozilla Firefox
- microsoft windows
- Measurement
- Computer bugs