Are Third-Party Libraries Secure? A Software Library Checker for Java

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Authors

Research Organisations

View graph of relations

Details

Original languageEnglish
Title of host publicationRisks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers
Subtitle of host publication13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers
EditorsAkka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens
Pages18-34
Number of pages17
Edition1.
ISBN (electronic)978-3-030-12143-3
Publication statusPublished - 25 Jan 2019
Event13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018 - Arcachon, France
Duration: 16 Oct 201818 Oct 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11391 LNCS
ISSN (Print)0302-9743
ISSN (electronic)1611-3349

Abstract

Nowadays, there are many software libraries for different purposes that are used by various projects. An application is only as secure as its weakest component; thus if an imported library includes a certain vulnerability, an application could get insecure. Therefore a widespread search for existing security flaws within used libraries is necessary. Big databases like the National Vulnerability Database (NVD) comprise reported security incidents and can be utilized to determine whether a software library is secure or not. This classification is a very time-consuming and exhausting task. We have developed a tool-based automated approach for supporting developers in this complex task through heuristics embedded in an eclipse plugin. Documented vulnerabilities stored in databases will be taken into consideration for the security classification of libraries. Weaknesses do not always entail the same consequences; a scoring that identifies the criticality oriented on their potential consequences is applied. In this paper, a method for the enrichment of knowledge containing vulnerability databases is considered. Our approach is focussing on the scope of software weaknesses, which are library reasoned and documented in vulnerability databases. The Java Library Checker was implemented as eclipse plugin for supporting developers to make potential insecure third-party libraries visible to them.

Keywords

    Metadata, Software library, Vulnerability database

ASJC Scopus subject areas

Cite this

Are Third-Party Libraries Secure? A Software Library Checker for Java. / Viertel, Fabien Patrick; Kortum, Fabian; Wagner, Leif et al.
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers. ed. / Akka Zemmari; Mohamed Mosbah; Nora Cuppens-Boulahia; Frédéric Cuppens. 1. ed. 2019. p. 18-34 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11391 LNCS).

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Viertel, FP, Kortum, F, Wagner, L & Schneider, K 2019, Are Third-Party Libraries Secure? A Software Library Checker for Java. in A Zemmari, M Mosbah, N Cuppens-Boulahia & F Cuppens (eds), Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers. 1. edn, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11391 LNCS, pp. 18-34, 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, Arcachon, France, 16 Oct 2018. https://doi.org/10.1007/978-3-030-12143-3_2
Viertel, F. P., Kortum, F., Wagner, L., & Schneider, K. (2019). Are Third-Party Libraries Secure? A Software Library Checker for Java. In A. Zemmari, M. Mosbah, N. Cuppens-Boulahia, & F. Cuppens (Eds.), Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers (1. ed., pp. 18-34). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11391 LNCS). https://doi.org/10.1007/978-3-030-12143-3_2
Viertel FP, Kortum F, Wagner L, Schneider K. Are Third-Party Libraries Secure? A Software Library Checker for Java. In Zemmari A, Mosbah M, Cuppens-Boulahia N, Cuppens F, editors, Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers. 1. ed. 2019. p. 18-34. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi: 10.1007/978-3-030-12143-3_2
Viertel, Fabien Patrick ; Kortum, Fabian ; Wagner, Leif et al. / Are Third-Party Libraries Secure? A Software Library Checker for Java. Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers. editor / Akka Zemmari ; Mohamed Mosbah ; Nora Cuppens-Boulahia ; Frédéric Cuppens. 1. ed. 2019. pp. 18-34 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Download
@inproceedings{22624fa0299f46ccb94e96d622959e81,
title = "Are Third-Party Libraries Secure?: A Software Library Checker for Java",
abstract = "Nowadays, there are many software libraries for different purposes that are used by various projects. An application is only as secure as its weakest component; thus if an imported library includes a certain vulnerability, an application could get insecure. Therefore a widespread search for existing security flaws within used libraries is necessary. Big databases like the National Vulnerability Database (NVD) comprise reported security incidents and can be utilized to determine whether a software library is secure or not. This classification is a very time-consuming and exhausting task. We have developed a tool-based automated approach for supporting developers in this complex task through heuristics embedded in an eclipse plugin. Documented vulnerabilities stored in databases will be taken into consideration for the security classification of libraries. Weaknesses do not always entail the same consequences; a scoring that identifies the criticality oriented on their potential consequences is applied. In this paper, a method for the enrichment of knowledge containing vulnerability databases is considered. Our approach is focussing on the scope of software weaknesses, which are library reasoned and documented in vulnerability databases. The Java Library Checker was implemented as eclipse plugin for supporting developers to make potential insecure third-party libraries visible to them.",
keywords = "Metadata, Software library, Vulnerability database",
author = "Viertel, {Fabien Patrick} and Fabian Kortum and Leif Wagner and Kurt Schneider",
note = "{\textcopyright} 2019 Springer Nature Switzerland AG; 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018 ; Conference date: 16-10-2018 Through 18-10-2018",
year = "2019",
month = jan,
day = "25",
doi = "10.1007/978-3-030-12143-3_2",
language = "English",
isbn = "978-3-030-12142-6",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "18--34",
editor = "Akka Zemmari and Mohamed Mosbah and Nora Cuppens-Boulahia and Fr{\'e}d{\'e}ric Cuppens",
booktitle = "Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers",
edition = "1.",

}

Download

TY - GEN

T1 - Are Third-Party Libraries Secure?

T2 - 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018

AU - Viertel, Fabien Patrick

AU - Kortum, Fabian

AU - Wagner, Leif

AU - Schneider, Kurt

N1 - © 2019 Springer Nature Switzerland AG

PY - 2019/1/25

Y1 - 2019/1/25

N2 - Nowadays, there are many software libraries for different purposes that are used by various projects. An application is only as secure as its weakest component; thus if an imported library includes a certain vulnerability, an application could get insecure. Therefore a widespread search for existing security flaws within used libraries is necessary. Big databases like the National Vulnerability Database (NVD) comprise reported security incidents and can be utilized to determine whether a software library is secure or not. This classification is a very time-consuming and exhausting task. We have developed a tool-based automated approach for supporting developers in this complex task through heuristics embedded in an eclipse plugin. Documented vulnerabilities stored in databases will be taken into consideration for the security classification of libraries. Weaknesses do not always entail the same consequences; a scoring that identifies the criticality oriented on their potential consequences is applied. In this paper, a method for the enrichment of knowledge containing vulnerability databases is considered. Our approach is focussing on the scope of software weaknesses, which are library reasoned and documented in vulnerability databases. The Java Library Checker was implemented as eclipse plugin for supporting developers to make potential insecure third-party libraries visible to them.

AB - Nowadays, there are many software libraries for different purposes that are used by various projects. An application is only as secure as its weakest component; thus if an imported library includes a certain vulnerability, an application could get insecure. Therefore a widespread search for existing security flaws within used libraries is necessary. Big databases like the National Vulnerability Database (NVD) comprise reported security incidents and can be utilized to determine whether a software library is secure or not. This classification is a very time-consuming and exhausting task. We have developed a tool-based automated approach for supporting developers in this complex task through heuristics embedded in an eclipse plugin. Documented vulnerabilities stored in databases will be taken into consideration for the security classification of libraries. Weaknesses do not always entail the same consequences; a scoring that identifies the criticality oriented on their potential consequences is applied. In this paper, a method for the enrichment of knowledge containing vulnerability databases is considered. Our approach is focussing on the scope of software weaknesses, which are library reasoned and documented in vulnerability databases. The Java Library Checker was implemented as eclipse plugin for supporting developers to make potential insecure third-party libraries visible to them.

KW - Metadata

KW - Software library

KW - Vulnerability database

UR - http://www.scopus.com/inward/record.url?scp=85066090259&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-12143-3_2

DO - 10.1007/978-3-030-12143-3_2

M3 - Conference contribution

AN - SCOPUS:85066090259

SN - 978-3-030-12142-6

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 18

EP - 34

BT - Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers

A2 - Zemmari, Akka

A2 - Mosbah, Mohamed

A2 - Cuppens-Boulahia, Nora

A2 - Cuppens, Frédéric

Y2 - 16 October 2018 through 18 October 2018

ER -

By the same author(s)