Visible to the public Beyond the Attack Surface: Assessing Security Risk with Random Walks on Call GraphsConflict Detection Enabled

TitleBeyond the Attack Surface: Assessing Security Risk with Random Walks on Call Graphs
Publication TypeConference Paper
Year of Publication2016
AuthorsMunaiah, Nuthan, Andrew Meneely
Conference NameProceedings of the 2nd International Workshop on Software Protection
Date PublishedSep 1 2016
PublisherACM
Conference LocationVienna, Austria
KeywordsAttack Surface and Defense-in-Depth Metrics, attack surface metrics
Abstract

When reasoning about software security, researchers and practitioners use the phrase "attack surface" as a metaphor for risk. Enumerate and minimize the ways attackers can break in then risk is reduced and the system is better pro- tected, the metaphor says. But software systems are much more complicated than their surfaces. We propose function- and file-level attack surface metrics--proximity and risky walk--that enable fine-grained risk assessment. Our risky walk metric is highly configurable: we use PageRank on a probability-weighted call graph to simulate attacker be- havior of finding or exploiting a vulnerability. We provide evidence-based guidance for deploying these metrics, includ- ing an extensive parameter tuning study. We conducted an empirical study on two large open source projects, FFmpeg and Wireshark, to investigate the potential correlation be- tween our metrics and historical post-release vulnerabilities. We found our metrics to be statistically significantly asso- ciated with vulnerable functions/files with a small-to-large Cohen's d effect size. Our prediction model achieved an increase of 36% (in FFmpeg) and 27% (in Wireshark) in the average value of F 2 -measure over a base model built with SLOC and coupling metrics. Our prediction model outperformed comparable models from prior literature with notable improvements: 58% reduction in false negative rate, 81% reduction in false positive rate, and 548% increase in F 2 -measure. These metrics advance vulnerability prevention by (a) being flexible in terms of granularity, (b) performing better than vulnerability prediction literature, and (c) being tunable so that practitioners can tailor the metrics to their products and better assess security risk.

Citation KeyMeneely:2014:EIS:2661685.2661687
Refereed DesignationRefereed

Other available formats:

spro15-munaiahA.pdf
AttachmentSize
bytes