Authors
Jiamou Sun, Zhenchang Xing, Xin Xia, Qinghua Lu, Xiwei Xu, Liming Zhu
Publication date
2023/12/22
Journal
ACM Transactions on Software Engineering and Methodology
Volume
33
Issue
2
Pages
1-38
Publisher
ACM
Description
Vulnerable third-party libraries pose significant threats to software applications that reuse these libraries. At an industry scale of reuse, manual analysis of third-party library vulnerabilities can be easily overwhelmed by the sheer number of vulnerabilities continually collected from diverse sources for thousands of reused libraries. Our study of four large-scale, actively maintained vulnerability databases (NVD, IBM X-Force, ExploitDB, and Openwall) reveals the wide presence of information discrepancies, in terms of seven vulnerability aspects, i.e., product, version, component, vulnerability type, root cause, attack vector, and impact, between the reports for the same vulnerability from heterogeneous sources. It would be beneficial to integrate and cross-validate multi-source vulnerability information, but it demands automatic aspect extraction and aspect discrepancy detection. In this work, we experimented with a wide …
Total citations
202220232024113
Scholar articles
J Sun, Z Xing, X Xia, Q Lu, X Xu, L Zhu - ACM Transactions on Software Engineering and …, 2023