Visible to the public Beyond the Attack Surface: Assessing Security Risk with Random Walks on Call Graphs

TitleBeyond the Attack Surface: Assessing Security Risk with Random Walks on Call Graphs
Publication TypeConference Paper
Year of Publication2016
AuthorsMunaiah, Nuthan, Meneely, Andrew
Conference NameProceedings of the 2016 ACM Workshop on Software PROtection
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4576-7
Keywordsattack surface, Big Data, big data security, big data security metrics, composability, decomposition, Metrics, page rank, pubcrawl, risk, Security Audits, security metrics, Vulnerability
Abstract

When reasoning about software security, researchers and practitioners use the phrase ``attack surface'' as a metaphor for risk. Enumerate and minimize the ways attackers can break in then risk is reduced and the system is better protected, the metaphor says. But software systems are much more complicated than their surfaces. We propose function- and file-level attack surface metrics--proximity and risky walk--that enable fine-grained risk assessment. Our risky walk metric is highly configurable: we use PageRank on a probability-weighted call graph to simulate attacker behavior of finding or exploiting a vulnerability. We provide evidence-based guidance for deploying these metrics, including an extensive parameter tuning study. We conducted an empirical study on two large open source projects, FFmpeg and Wireshark, to investigate the potential correlation between our metrics and historical post-release vulnerabilities. We found our metrics to be statistically significantly associated with vulnerable functions/files with a small-to-large Cohen's d effect size. Our prediction model achieved an increase of 36% (in FFmpeg) and 27% (in Wireshark) in the average value of F-measure over a base model built with SLOC and coupling metrics. Our prediction model outperformed comparable models from prior literature with notable improvements: 58% reduction in false negative rate, 81% reduction in false positive rate, and 548% increase in F-measure. These metrics advance vulnerability prevention by [(a)] being flexible in terms of granularity, performing better than vulnerability prediction literature, and being tunable so that practitioners can tailor the metrics to their products and better assess security risk.

URLhttp://doi.acm.org/10.1145/2995306.2995311
DOI10.1145/2995306.2995311
Citation Keymunaiah_beyond_2016