Community Knowledge about Security: Identification and Classification of User Contributions

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Autoren

Organisationseinheiten

Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Titel des SammelwerksRisks and Security of Internet and Systems
Untertitel15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers
Herausgeber/-innenJoaquin Garcia-Alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich
Seiten181-197
Seitenumfang17
ISBN (elektronisch)978-3-030-68887-5
PublikationsstatusVeröffentlicht - 12 Feb. 2021
VeranstaltungThe 15th International Conference on Risks and Security of Internet and Systems - Online, Frankreich
Dauer: 3 Nov. 20206 Nov. 2020
https://www.crisis-conference.com/

Publikationsreihe

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Band12528 LNCS
ISSN (Print)0302-9743
ISSN (elektronisch)1611-3349

Abstract

Nowadays, confidential data of users and companies are processed
by various software applications. Therefore, it is necessary to protect
them against security
aws in source code, which could, for example,
allow the infringement of privacy. However, developers are usually not
equipped with the required expertise to fulll this task.
To their rescue, there are tools like security code clone detectors to disclose
vulnerable methods in source code. They try to find clones of written
project code and vulnerable code fragments stored in a reference
repository. Existing vulnerability databases, for instance the National
Vulnerability Database (NVD), contain data on reported weaknesses,
but the availability of example code for their occurrence, patch and exploit
is scarce. Developers also use community websites to find help for
secure implementations.
In this paper, we propose a semi-automated process to extract securityrelated
code from the Stack Exchange community network, where also
the coding community Stack Over
ow belongs. We classify the obtained
code through artificial intelligence combined with natural language processing
into the three security types: vulnerable, patch or exploit. In a
twofold evaluation, we compared both parts with the manual activity
of security experts. At first, for the search, our approach shows better
precision than the experts as well as a moderate recall. Secondly, the
results show that the classification of code fragments in security types is
not quite easy. The investigated approaches and security experts perform
with different strength regarding types of security.

Schlagwörter

    Source Code, Security, Clone Detection, Community Knowledge, Artificial Intelligence

ASJC Scopus Sachgebiete

Zitieren

Community Knowledge about Security: Identification and Classification of User Contributions. / Viertel, Fabien Patrick; Brunotte, Wasja; Evers, Yannick et al.
Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers. Hrsg. / Joaquin Garcia-Alfaro; Jean Leneutre; Nora Cuppens; Reda Yaich. 2021. S. 181-197 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12528 LNCS).

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Viertel, FP, Brunotte, W, Evers, Y & Schneider, K 2021, Community Knowledge about Security: Identification and Classification of User Contributions. in J Garcia-Alfaro, J Leneutre, N Cuppens & R Yaich (Hrsg.), Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bd. 12528 LNCS, S. 181-197, The 15th International Conference on Risks and Security of Internet and Systems, Frankreich, 3 Nov. 2020. https://doi.org/10.1007/978-3-030-68887-5_11
Viertel, F. P., Brunotte, W., Evers, Y., & Schneider, K. (2021). Community Knowledge about Security: Identification and Classification of User Contributions. In J. Garcia-Alfaro, J. Leneutre, N. Cuppens, & R. Yaich (Hrsg.), Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers (S. 181-197). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12528 LNCS). https://doi.org/10.1007/978-3-030-68887-5_11
Viertel FP, Brunotte W, Evers Y, Schneider K. Community Knowledge about Security: Identification and Classification of User Contributions. in Garcia-Alfaro J, Leneutre J, Cuppens N, Yaich R, Hrsg., Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers. 2021. S. 181-197. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi: 10.1007/978-3-030-68887-5_11
Viertel, Fabien Patrick ; Brunotte, Wasja ; Evers, Yannick et al. / Community Knowledge about Security : Identification and Classification of User Contributions. Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers. Hrsg. / Joaquin Garcia-Alfaro ; Jean Leneutre ; Nora Cuppens ; Reda Yaich. 2021. S. 181-197 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Download
@inproceedings{0a4c7b1d02ed4fc8ada0a57a8c39efb0,
title = "Community Knowledge about Security: Identification and Classification of User Contributions",
abstract = "Nowadays, confidential data of users and companies are processed by various software applications. Therefore, it is necessary to protect them against security flaws in source code, which could, for example, allow the infringement of privacy. However, developers are usually not equipped with the required expertise to fulfill this task. To their rescue, there are tools like security code clone detectors to disclose vulnerable methods in source code. They try to find clones of written project code and vulnerable code fragments stored in a reference repository. Existing vulnerability databases, for instance the National Vulnerability Database (NVD), contain data on reported weaknesses, but the availability of example code for their occurrence, patch and exploit is scarce. Developers also use community websites to find help for secure implementations. In this paper, we propose a semi-automated process to extract security-related code from the Stack Exchange community network, where also the coding community Stack Overflow belongs. We classify the obtained code through artificial intelligence combined with natural language processing into the three security types: vulnerable, patch or exploit. In a twofold evaluation, we compared both parts with the manual activity of security experts. At first, for the search, our approach shows better precision than the experts as well as a moderate recall. Secondly, the results show that the classification of code fragments in security types is not quite easy. The investigated approaches and security experts perform with different strength regarding types of security.",
keywords = "Source Code, Security, Clone Detection, Community Knowledge, Artificial Intelligence, Artificial intelligence, Clone detection, Community knowledge, Security, Source code",
author = "Viertel, {Fabien Patrick} and Wasja Brunotte and Yannick Evers and Kurt Schneider",
year = "2021",
month = feb,
day = "12",
doi = "10.1007/978-3-030-68887-5_11",
language = "English",
isbn = "978-3-030-68886-8",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "181--197",
editor = "Joaquin Garcia-Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich",
booktitle = "Risks and Security of Internet and Systems",
note = "The 15th International Conference on Risks and Security of Internet and Systems ; Conference date: 03-11-2020 Through 06-11-2020",
url = "https://www.crisis-conference.com/",

}

Download

TY - GEN

T1 - Community Knowledge about Security

T2 - The 15th International Conference on Risks and Security of Internet and Systems

AU - Viertel, Fabien Patrick

AU - Brunotte, Wasja

AU - Evers, Yannick

AU - Schneider, Kurt

PY - 2021/2/12

Y1 - 2021/2/12

N2 - Nowadays, confidential data of users and companies are processed by various software applications. Therefore, it is necessary to protect them against security flaws in source code, which could, for example, allow the infringement of privacy. However, developers are usually not equipped with the required expertise to fulfill this task. To their rescue, there are tools like security code clone detectors to disclose vulnerable methods in source code. They try to find clones of written project code and vulnerable code fragments stored in a reference repository. Existing vulnerability databases, for instance the National Vulnerability Database (NVD), contain data on reported weaknesses, but the availability of example code for their occurrence, patch and exploit is scarce. Developers also use community websites to find help for secure implementations. In this paper, we propose a semi-automated process to extract security-related code from the Stack Exchange community network, where also the coding community Stack Overflow belongs. We classify the obtained code through artificial intelligence combined with natural language processing into the three security types: vulnerable, patch or exploit. In a twofold evaluation, we compared both parts with the manual activity of security experts. At first, for the search, our approach shows better precision than the experts as well as a moderate recall. Secondly, the results show that the classification of code fragments in security types is not quite easy. The investigated approaches and security experts perform with different strength regarding types of security.

AB - Nowadays, confidential data of users and companies are processed by various software applications. Therefore, it is necessary to protect them against security flaws in source code, which could, for example, allow the infringement of privacy. However, developers are usually not equipped with the required expertise to fulfill this task. To their rescue, there are tools like security code clone detectors to disclose vulnerable methods in source code. They try to find clones of written project code and vulnerable code fragments stored in a reference repository. Existing vulnerability databases, for instance the National Vulnerability Database (NVD), contain data on reported weaknesses, but the availability of example code for their occurrence, patch and exploit is scarce. Developers also use community websites to find help for secure implementations. In this paper, we propose a semi-automated process to extract security-related code from the Stack Exchange community network, where also the coding community Stack Overflow belongs. We classify the obtained code through artificial intelligence combined with natural language processing into the three security types: vulnerable, patch or exploit. In a twofold evaluation, we compared both parts with the manual activity of security experts. At first, for the search, our approach shows better precision than the experts as well as a moderate recall. Secondly, the results show that the classification of code fragments in security types is not quite easy. The investigated approaches and security experts perform with different strength regarding types of security.

KW - Source Code

KW - Security

KW - Clone Detection

KW - Community Knowledge

KW - Artificial Intelligence

KW - Artificial intelligence

KW - Clone detection

KW - Community knowledge

KW - Security

KW - Source code

UR - http://www.scopus.com/inward/record.url?scp=85102652194&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-68887-5_11

DO - 10.1007/978-3-030-68887-5_11

M3 - Conference contribution

SN - 978-3-030-68886-8

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 181

EP - 197

BT - Risks and Security of Internet and Systems

A2 - Garcia-Alfaro, Joaquin

A2 - Leneutre, Jean

A2 - Cuppens, Nora

A2 - Yaich, Reda

Y2 - 3 November 2020 through 6 November 2020

ER -

Von denselben Autoren