Loading…
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects
With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix...
Saved in:
Main Authors: | , , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 2552 |
container_issue | |
container_start_page | 2540 |
container_title | |
container_volume | |
creator | Zhang, Lyuye Liu, Chengwei Xu, Zhengzi Chen, Sen Fan, Lingling Zhao, Lida Wu, Jiahui Liu, Yang |
description | With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix vulnerabilities, the quality of which varies substantially. However, ineffective remediation could induce side effects, such as compilation failures, which impede acceptance by users. According to our studies, existing SCA tools could not correctly handle the concerns of users regarding the compatibility of remediated projects. To this end, we propose Compatible Remediation of Third-party libraries (CORAL) for Maven projects to fix vulnerabilities without breaking the projects. The evaluation proved that CORAL not only fixed 87.56% of vulnerabilities which outperformed other tools (best 75.32%) and achieved a 98.67% successful compilation rate and a 92.96% successful unit test rate. Furthermore, we found that 78.45% of vulnerabilities in popular Maven projects could be fixed without breaking the compilation, and the rest of the vulnerabilities (21.55%) could either be fixed by upgrades that break the compilations or even be impossible to fix by upgrading. |
doi_str_mv | 10.1109/ICSE48619.2023.00212 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>acm_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10172542</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10172542</ieee_id><sourcerecordid>acm_books_10_1109_ICSE48619_2023_00212</sourcerecordid><originalsourceid>FETCH-LOGICAL-a286t-1aefdacfd8f7c50657f2c1d223c3a1cd6f8b0e956aacca5a62aa3f6225ebf393</originalsourceid><addsrcrecordid>eNqVkMFKAzEQhqMiWGrfoId9ga2ZpMlujrJUrRQsWnoNk2yC0d2mZFehb-_aigdvwsAwfD8D_0fIFOgMgKqbZfWymJcS1IxRxmeUMmBnZKKKEqQUc1FQUOdkBEKUOTAmLv6wKzLpumCoAMWAUzki2yq2e-yDaVz27FpXh-GIu2yY7UezcwlNaEIfXJf5FNts8xpSna8x9YdsFUzCdEQxZY_4idk6xTdn--6aXHpsOjf52WOyuVtsqod89XS_rG5XObJS9jmg8zVaX5e-sIJKUXhmoWaMW45ga-lLQ50SEtFaFCgZIvdyaOaM54qPyfT0Njjn9D6FFtNBA4WCiTkbcH7CaFttYnzvBqa_Tepfk_rbpD6aHPL8P3lthvKefwFcinLy</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects</title><source>IEEE Xplore All Conference Series</source><creator>Zhang, Lyuye ; Liu, Chengwei ; Xu, Zhengzi ; Chen, Sen ; Fan, Lingling ; Zhao, Lida ; Wu, Jiahui ; Liu, Yang</creator><creatorcontrib>Zhang, Lyuye ; Liu, Chengwei ; Xu, Zhengzi ; Chen, Sen ; Fan, Lingling ; Zhao, Lida ; Wu, Jiahui ; Liu, Yang</creatorcontrib><description>With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix vulnerabilities, the quality of which varies substantially. However, ineffective remediation could induce side effects, such as compilation failures, which impede acceptance by users. According to our studies, existing SCA tools could not correctly handle the concerns of users regarding the compatibility of remediated projects. To this end, we propose Compatible Remediation of Third-party libraries (CORAL) for Maven projects to fix vulnerabilities without breaking the projects. The evaluation proved that CORAL not only fixed 87.56% of vulnerabilities which outperformed other tools (best 75.32%) and achieved a 98.67% successful compilation rate and a 92.96% successful unit test rate. Furthermore, we found that 78.45% of vulnerabilities in popular Maven projects could be fixed without breaking the compilation, and the rest of the vulnerabilities (21.55%) could either be fixed by upgrades that break the compilations or even be impossible to fix by upgrading.</description><identifier>ISBN: 9781665457019</identifier><identifier>ISBN: 1665457015</identifier><identifier>EISSN: 1558-1225</identifier><identifier>EISBN: 9781665457019</identifier><identifier>EISBN: 1665457015</identifier><identifier>DOI: 10.1109/ICSE48619.2023.00212</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>Piscataway, NJ, USA: IEEE Press</publisher><subject>Compatibility ; Java ; Libraries ; Open source software ; Remediation ; Security ; Software engineering</subject><ispartof>2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), 2023, p.2540-2552</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10172542$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10172542$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zhang, Lyuye</creatorcontrib><creatorcontrib>Liu, Chengwei</creatorcontrib><creatorcontrib>Xu, Zhengzi</creatorcontrib><creatorcontrib>Chen, Sen</creatorcontrib><creatorcontrib>Fan, Lingling</creatorcontrib><creatorcontrib>Zhao, Lida</creatorcontrib><creatorcontrib>Wu, Jiahui</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><title>Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects</title><title>2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)</title><addtitle>ICSE</addtitle><description>With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix vulnerabilities, the quality of which varies substantially. However, ineffective remediation could induce side effects, such as compilation failures, which impede acceptance by users. According to our studies, existing SCA tools could not correctly handle the concerns of users regarding the compatibility of remediated projects. To this end, we propose Compatible Remediation of Third-party libraries (CORAL) for Maven projects to fix vulnerabilities without breaking the projects. The evaluation proved that CORAL not only fixed 87.56% of vulnerabilities which outperformed other tools (best 75.32%) and achieved a 98.67% successful compilation rate and a 92.96% successful unit test rate. Furthermore, we found that 78.45% of vulnerabilities in popular Maven projects could be fixed without breaking the compilation, and the rest of the vulnerabilities (21.55%) could either be fixed by upgrades that break the compilations or even be impossible to fix by upgrading.</description><subject>Compatibility</subject><subject>Java</subject><subject>Libraries</subject><subject>Open source software</subject><subject>Remediation</subject><subject>Security</subject><subject>Software engineering</subject><issn>1558-1225</issn><isbn>9781665457019</isbn><isbn>1665457015</isbn><isbn>9781665457019</isbn><isbn>1665457015</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqVkMFKAzEQhqMiWGrfoId9ga2ZpMlujrJUrRQsWnoNk2yC0d2mZFehb-_aigdvwsAwfD8D_0fIFOgMgKqbZfWymJcS1IxRxmeUMmBnZKKKEqQUc1FQUOdkBEKUOTAmLv6wKzLpumCoAMWAUzki2yq2e-yDaVz27FpXh-GIu2yY7UezcwlNaEIfXJf5FNts8xpSna8x9YdsFUzCdEQxZY_4idk6xTdn--6aXHpsOjf52WOyuVtsqod89XS_rG5XObJS9jmg8zVaX5e-sIJKUXhmoWaMW45ga-lLQ50SEtFaFCgZIvdyaOaM54qPyfT0Njjn9D6FFtNBA4WCiTkbcH7CaFttYnzvBqa_Tepfk_rbpD6aHPL8P3lthvKefwFcinLy</recordid><startdate>20230514</startdate><enddate>20230514</enddate><creator>Zhang, Lyuye</creator><creator>Liu, Chengwei</creator><creator>Xu, Zhengzi</creator><creator>Chen, Sen</creator><creator>Fan, Lingling</creator><creator>Zhao, Lida</creator><creator>Wu, Jiahui</creator><creator>Liu, Yang</creator><general>IEEE Press</general><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20230514</creationdate><title>Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects</title><author>Zhang, Lyuye ; Liu, Chengwei ; Xu, Zhengzi ; Chen, Sen ; Fan, Lingling ; Zhao, Lida ; Wu, Jiahui ; Liu, Yang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a286t-1aefdacfd8f7c50657f2c1d223c3a1cd6f8b0e956aacca5a62aa3f6225ebf393</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Compatibility</topic><topic>Java</topic><topic>Libraries</topic><topic>Open source software</topic><topic>Remediation</topic><topic>Security</topic><topic>Software engineering</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Lyuye</creatorcontrib><creatorcontrib>Liu, Chengwei</creatorcontrib><creatorcontrib>Xu, Zhengzi</creatorcontrib><creatorcontrib>Chen, Sen</creatorcontrib><creatorcontrib>Fan, Lingling</creatorcontrib><creatorcontrib>Zhao, Lida</creatorcontrib><creatorcontrib>Wu, Jiahui</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhang, Lyuye</au><au>Liu, Chengwei</au><au>Xu, Zhengzi</au><au>Chen, Sen</au><au>Fan, Lingling</au><au>Zhao, Lida</au><au>Wu, Jiahui</au><au>Liu, Yang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects</atitle><btitle>2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)</btitle><stitle>ICSE</stitle><date>2023-05-14</date><risdate>2023</risdate><spage>2540</spage><epage>2552</epage><pages>2540-2552</pages><eissn>1558-1225</eissn><isbn>9781665457019</isbn><isbn>1665457015</isbn><eisbn>9781665457019</eisbn><eisbn>1665457015</eisbn><coden>IEEPAD</coden><abstract>With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix vulnerabilities, the quality of which varies substantially. However, ineffective remediation could induce side effects, such as compilation failures, which impede acceptance by users. According to our studies, existing SCA tools could not correctly handle the concerns of users regarding the compatibility of remediated projects. To this end, we propose Compatible Remediation of Third-party libraries (CORAL) for Maven projects to fix vulnerabilities without breaking the projects. The evaluation proved that CORAL not only fixed 87.56% of vulnerabilities which outperformed other tools (best 75.32%) and achieved a 98.67% successful compilation rate and a 92.96% successful unit test rate. Furthermore, we found that 78.45% of vulnerabilities in popular Maven projects could be fixed without breaking the compilation, and the rest of the vulnerabilities (21.55%) could either be fixed by upgrades that break the compilations or even be impossible to fix by upgrading.</abstract><cop>Piscataway, NJ, USA</cop><pub>IEEE Press</pub><doi>10.1109/ICSE48619.2023.00212</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781665457019 |
ispartof | 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), 2023, p.2540-2552 |
issn | 1558-1225 |
language | eng |
recordid | cdi_ieee_primary_10172542 |
source | IEEE Xplore All Conference Series |
subjects | Compatibility Java Libraries Open source software Remediation Security Software engineering |
title | Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T02%3A02%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Compatible%20Remediation%20on%20Vulnerabilities%20from%20Third-Party%20Libraries%20for%20Java%20Projects&rft.btitle=2023%20IEEE/ACM%2045th%20International%20Conference%20on%20Software%20Engineering%20(ICSE)&rft.au=Zhang,%20Lyuye&rft.date=2023-05-14&rft.spage=2540&rft.epage=2552&rft.pages=2540-2552&rft.eissn=1558-1225&rft.isbn=9781665457019&rft.isbn_list=1665457015&rft.coden=IEEPAD&rft_id=info:doi/10.1109/ICSE48619.2023.00212&rft.eisbn=9781665457019&rft.eisbn_list=1665457015&rft_dat=%3Cacm_CHZPO%3Eacm_books_10_1109_ICSE48619_2023_00212%3C/acm_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-a286t-1aefdacfd8f7c50657f2c1d223c3a1cd6f8b0e956aacca5a62aa3f6225ebf393%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10172542&rfr_iscdi=true |