Loading…

Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects

With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhang, Lyuye, Liu, Chengwei, Xu, Zhengzi, Chen, Sen, Fan, Lingling, Zhao, Lida, Wu, Jiahui, Liu, Yang
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 2552
container_issue
container_start_page 2540
container_title
container_volume
creator Zhang, Lyuye
Liu, Chengwei
Xu, Zhengzi
Chen, Sen
Fan, Lingling
Zhao, Lida
Wu, Jiahui
Liu, Yang
description With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix vulnerabilities, the quality of which varies substantially. However, ineffective remediation could induce side effects, such as compilation failures, which impede acceptance by users. According to our studies, existing SCA tools could not correctly handle the concerns of users regarding the compatibility of remediated projects. To this end, we propose Compatible Remediation of Third-party libraries (CORAL) for Maven projects to fix vulnerabilities without breaking the projects. The evaluation proved that CORAL not only fixed 87.56% of vulnerabilities which outperformed other tools (best 75.32%) and achieved a 98.67% successful compilation rate and a 92.96% successful unit test rate. Furthermore, we found that 78.45% of vulnerabilities in popular Maven projects could be fixed without breaking the compilation, and the rest of the vulnerabilities (21.55%) could either be fixed by upgrades that break the compilations or even be impossible to fix by upgrading.
doi_str_mv 10.1109/ICSE48619.2023.00212
format conference_proceeding
fullrecord <record><control><sourceid>acm_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10172542</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10172542</ieee_id><sourcerecordid>acm_books_10_1109_ICSE48619_2023_00212</sourcerecordid><originalsourceid>FETCH-LOGICAL-a286t-1aefdacfd8f7c50657f2c1d223c3a1cd6f8b0e956aacca5a62aa3f6225ebf393</originalsourceid><addsrcrecordid>eNqVkMFKAzEQhqMiWGrfoId9ga2ZpMlujrJUrRQsWnoNk2yC0d2mZFehb-_aigdvwsAwfD8D_0fIFOgMgKqbZfWymJcS1IxRxmeUMmBnZKKKEqQUc1FQUOdkBEKUOTAmLv6wKzLpumCoAMWAUzki2yq2e-yDaVz27FpXh-GIu2yY7UezcwlNaEIfXJf5FNts8xpSna8x9YdsFUzCdEQxZY_4idk6xTdn--6aXHpsOjf52WOyuVtsqod89XS_rG5XObJS9jmg8zVaX5e-sIJKUXhmoWaMW45ga-lLQ50SEtFaFCgZIvdyaOaM54qPyfT0Njjn9D6FFtNBA4WCiTkbcH7CaFttYnzvBqa_Tepfk_rbpD6aHPL8P3lthvKefwFcinLy</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects</title><source>IEEE Xplore All Conference Series</source><creator>Zhang, Lyuye ; Liu, Chengwei ; Xu, Zhengzi ; Chen, Sen ; Fan, Lingling ; Zhao, Lida ; Wu, Jiahui ; Liu, Yang</creator><creatorcontrib>Zhang, Lyuye ; Liu, Chengwei ; Xu, Zhengzi ; Chen, Sen ; Fan, Lingling ; Zhao, Lida ; Wu, Jiahui ; Liu, Yang</creatorcontrib><description>With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix vulnerabilities, the quality of which varies substantially. However, ineffective remediation could induce side effects, such as compilation failures, which impede acceptance by users. According to our studies, existing SCA tools could not correctly handle the concerns of users regarding the compatibility of remediated projects. To this end, we propose Compatible Remediation of Third-party libraries (CORAL) for Maven projects to fix vulnerabilities without breaking the projects. The evaluation proved that CORAL not only fixed 87.56% of vulnerabilities which outperformed other tools (best 75.32%) and achieved a 98.67% successful compilation rate and a 92.96% successful unit test rate. Furthermore, we found that 78.45% of vulnerabilities in popular Maven projects could be fixed without breaking the compilation, and the rest of the vulnerabilities (21.55%) could either be fixed by upgrades that break the compilations or even be impossible to fix by upgrading.</description><identifier>ISBN: 9781665457019</identifier><identifier>ISBN: 1665457015</identifier><identifier>EISSN: 1558-1225</identifier><identifier>EISBN: 9781665457019</identifier><identifier>EISBN: 1665457015</identifier><identifier>DOI: 10.1109/ICSE48619.2023.00212</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>Piscataway, NJ, USA: IEEE Press</publisher><subject>Compatibility ; Java ; Libraries ; Open source software ; Remediation ; Security ; Software engineering</subject><ispartof>2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), 2023, p.2540-2552</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10172542$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10172542$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zhang, Lyuye</creatorcontrib><creatorcontrib>Liu, Chengwei</creatorcontrib><creatorcontrib>Xu, Zhengzi</creatorcontrib><creatorcontrib>Chen, Sen</creatorcontrib><creatorcontrib>Fan, Lingling</creatorcontrib><creatorcontrib>Zhao, Lida</creatorcontrib><creatorcontrib>Wu, Jiahui</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><title>Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects</title><title>2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)</title><addtitle>ICSE</addtitle><description>With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix vulnerabilities, the quality of which varies substantially. However, ineffective remediation could induce side effects, such as compilation failures, which impede acceptance by users. According to our studies, existing SCA tools could not correctly handle the concerns of users regarding the compatibility of remediated projects. To this end, we propose Compatible Remediation of Third-party libraries (CORAL) for Maven projects to fix vulnerabilities without breaking the projects. The evaluation proved that CORAL not only fixed 87.56% of vulnerabilities which outperformed other tools (best 75.32%) and achieved a 98.67% successful compilation rate and a 92.96% successful unit test rate. Furthermore, we found that 78.45% of vulnerabilities in popular Maven projects could be fixed without breaking the compilation, and the rest of the vulnerabilities (21.55%) could either be fixed by upgrades that break the compilations or even be impossible to fix by upgrading.</description><subject>Compatibility</subject><subject>Java</subject><subject>Libraries</subject><subject>Open source software</subject><subject>Remediation</subject><subject>Security</subject><subject>Software engineering</subject><issn>1558-1225</issn><isbn>9781665457019</isbn><isbn>1665457015</isbn><isbn>9781665457019</isbn><isbn>1665457015</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqVkMFKAzEQhqMiWGrfoId9ga2ZpMlujrJUrRQsWnoNk2yC0d2mZFehb-_aigdvwsAwfD8D_0fIFOgMgKqbZfWymJcS1IxRxmeUMmBnZKKKEqQUc1FQUOdkBEKUOTAmLv6wKzLpumCoAMWAUzki2yq2e-yDaVz27FpXh-GIu2yY7UezcwlNaEIfXJf5FNts8xpSna8x9YdsFUzCdEQxZY_4idk6xTdn--6aXHpsOjf52WOyuVtsqod89XS_rG5XObJS9jmg8zVaX5e-sIJKUXhmoWaMW45ga-lLQ50SEtFaFCgZIvdyaOaM54qPyfT0Njjn9D6FFtNBA4WCiTkbcH7CaFttYnzvBqa_Tepfk_rbpD6aHPL8P3lthvKefwFcinLy</recordid><startdate>20230514</startdate><enddate>20230514</enddate><creator>Zhang, Lyuye</creator><creator>Liu, Chengwei</creator><creator>Xu, Zhengzi</creator><creator>Chen, Sen</creator><creator>Fan, Lingling</creator><creator>Zhao, Lida</creator><creator>Wu, Jiahui</creator><creator>Liu, Yang</creator><general>IEEE Press</general><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20230514</creationdate><title>Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects</title><author>Zhang, Lyuye ; Liu, Chengwei ; Xu, Zhengzi ; Chen, Sen ; Fan, Lingling ; Zhao, Lida ; Wu, Jiahui ; Liu, Yang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a286t-1aefdacfd8f7c50657f2c1d223c3a1cd6f8b0e956aacca5a62aa3f6225ebf393</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Compatibility</topic><topic>Java</topic><topic>Libraries</topic><topic>Open source software</topic><topic>Remediation</topic><topic>Security</topic><topic>Software engineering</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Lyuye</creatorcontrib><creatorcontrib>Liu, Chengwei</creatorcontrib><creatorcontrib>Xu, Zhengzi</creatorcontrib><creatorcontrib>Chen, Sen</creatorcontrib><creatorcontrib>Fan, Lingling</creatorcontrib><creatorcontrib>Zhao, Lida</creatorcontrib><creatorcontrib>Wu, Jiahui</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhang, Lyuye</au><au>Liu, Chengwei</au><au>Xu, Zhengzi</au><au>Chen, Sen</au><au>Fan, Lingling</au><au>Zhao, Lida</au><au>Wu, Jiahui</au><au>Liu, Yang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects</atitle><btitle>2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)</btitle><stitle>ICSE</stitle><date>2023-05-14</date><risdate>2023</risdate><spage>2540</spage><epage>2552</epage><pages>2540-2552</pages><eissn>1558-1225</eissn><isbn>9781665457019</isbn><isbn>1665457015</isbn><eisbn>9781665457019</eisbn><eisbn>1665457015</eisbn><coden>IEEPAD</coden><abstract>With the increasing disclosure of vulnerabilities in open-source software, software composition analysis (SCA) has been widely applied to reveal third-party libraries and the associated vulnerabilities in software projects. Beyond the revelation, SCA tools adopt various remediation strategies to fix vulnerabilities, the quality of which varies substantially. However, ineffective remediation could induce side effects, such as compilation failures, which impede acceptance by users. According to our studies, existing SCA tools could not correctly handle the concerns of users regarding the compatibility of remediated projects. To this end, we propose Compatible Remediation of Third-party libraries (CORAL) for Maven projects to fix vulnerabilities without breaking the projects. The evaluation proved that CORAL not only fixed 87.56% of vulnerabilities which outperformed other tools (best 75.32%) and achieved a 98.67% successful compilation rate and a 92.96% successful unit test rate. Furthermore, we found that 78.45% of vulnerabilities in popular Maven projects could be fixed without breaking the compilation, and the rest of the vulnerabilities (21.55%) could either be fixed by upgrades that break the compilations or even be impossible to fix by upgrading.</abstract><cop>Piscataway, NJ, USA</cop><pub>IEEE Press</pub><doi>10.1109/ICSE48619.2023.00212</doi><tpages>13</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781665457019
ispartof 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), 2023, p.2540-2552
issn 1558-1225
language eng
recordid cdi_ieee_primary_10172542
source IEEE Xplore All Conference Series
subjects Compatibility
Java
Libraries
Open source software
Remediation
Security
Software engineering
title Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T02%3A02%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Compatible%20Remediation%20on%20Vulnerabilities%20from%20Third-Party%20Libraries%20for%20Java%20Projects&rft.btitle=2023%20IEEE/ACM%2045th%20International%20Conference%20on%20Software%20Engineering%20(ICSE)&rft.au=Zhang,%20Lyuye&rft.date=2023-05-14&rft.spage=2540&rft.epage=2552&rft.pages=2540-2552&rft.eissn=1558-1225&rft.isbn=9781665457019&rft.isbn_list=1665457015&rft.coden=IEEPAD&rft_id=info:doi/10.1109/ICSE48619.2023.00212&rft.eisbn=9781665457019&rft.eisbn_list=1665457015&rft_dat=%3Cacm_CHZPO%3Eacm_books_10_1109_ICSE48619_2023_00212%3C/acm_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-a286t-1aefdacfd8f7c50657f2c1d223c3a1cd6f8b0e956aacca5a62aa3f6225ebf393%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10172542&rfr_iscdi=true