The Beauty and the Beast: Vulnerability in Red Hat’s Packages

In an empirical study of 3241 Red Hat packages, we show that software vulnerabilities correlate with dependencies between packages. With formal concept analysis and statistical hypothesis testing, we identify dependencies that decrease the risk of vulnerabilities (“beauties”) or increase the risk (“beasts”). Using support vector machines on dependency data, our prediction models successfully and consistently catch about two thirds of vulnerable packages (median recall of 0.65). When our models predict a package as vulnerable, it is correct more than eight times out of ten (median precision of 0.83). Out of 25 packages predicted to contain unknown vulnerabilities in January 2008, 9 needed fixing within six months, and another one was found to be vulnerable recently. Our findings help developers to choose new dependencies wisely and make them aware of risky dependencies.

Joint work with Thomas Zimmermann (Microsoft Research)

Speaker Details

Stephan Neuhaus has been working in computer security since 1992, when he was a member of the PGP 2 development team. He has a PhD in computer science from Saarland University, Germany (advisors: Andreas Zeller, Michael Backes) and now works as a postdoc at the University of Trento, Italy. His research interest is software and system security with a strong focus on ways to help write more secure programs.

Date:
Speakers:
Stephan Neuhaus
Affiliation:
University of Trento, Italy