Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities
Title | Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Sultana, K. Z., Deo, A., Williams, B. J. |
Conference Name | 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE) |
ISBN Number | 978-1-5090-4636-2 |
Keywords | Arrays, coding theory, Complexity theory, compositionality, cryptography, Java, Measurement, Metrics, nano-patterns, pubcrawl, resilience, Resiliency, security, security vulnerabilities, Software, Software patterns, static analysis, Testing |
Abstract | Ensuring software security is essential for developing a reliable software. A software can suffer from security problems due to the weakness in code constructs during software development. Our goal is to relate software security with different code constructs so that developers can be aware very early of their coding weaknesses that might be related to a software vulnerability. In this study, we chose Java nano-patterns as code constructs that are method-level patterns defined on the attributes of Java methods. This study aims to find out the correlation between software vulnerability and method-level structural code constructs known as nano-patterns. We found the vulnerable methods from 39 versions of three major releases of Apache Tomcat for our first case study. We extracted nano-patterns from the affected methods of these releases. We also extracted nano-patterns from the non-vulnerable methods of Apache Tomcat, and for this, we selected the last version of three major releases (6.0.45 for release 6, 7.0.69 for release 7 and 8.0.33 for release 8) as the non-vulnerable versions. Then, we compared the nano-pattern distributions in vulnerable versus non-vulnerable methods. In our second case study, we extracted nano-patterns from the affected methods of three vulnerable J2EE web applications: Blueblog 1.0, Personalblog 1.2.6 and Roller 0.9.9, all of which were deliberately made vulnerable for testing purpose. We found that some nano-patterns such as objCreator, staticFieldReader, typeManipulator, looper, exceptions, localWriter, arrReader are more prevalent in affected methods whereas some such as straightLine are more vivid in non-affected methods. We conclude that nano-patterns can be used as the indicator of vulnerability-proneness of code. |
URL | http://ieeexplore.ieee.org/document/7911873/ |
DOI | 10.1109/HASE.2017.18 |
Citation Key | sultana_correlation_2017 |