Skip to content

Instantly share code, notes, and snippets.

@monperrus
Created March 15, 2024 18:08
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save monperrus/143332b5ca414f7967a4e94ecd1354c9 to your computer and use it in GitHub Desktop.
Save monperrus/143332b5ca414f7967a4e94ecd1354c9 to your computer and use it in GitHub Desktop.
{
"articles" : [
{
"abstract" : "While vulnerability databases are important sources of information for software security, it is known that information in these databases is inconsistent. How to rectify these incorrect data is a challenging issue. In this article, we employ developer logs and patches to automatically identify vulnerable source code versions that each CVE really affects. Our tool organizes all versions of a piece of software into a version tree, and identifies the first vulnerable version, and the last vulnerable versions in the version tree trunk and branches. For evaluation, we took Linux Kernel as the case study and quantified the error rate of the vulnerable versions reported by the NVD. The total number of vulnerable Linux Kernel versions reported by the NVD was 43,727 (as of September 2020), of which the total number of false positives reached 2,497 and the total number of false negatives reached 9,330, accounting for 5.7% and 21.34%, respectively. In addition, we compare our tool with two vulnerability detection tools and show that our tool could achieve high detection accuracy.",
"abstract_url" : "https://ieeexplore.ieee.org/document/10093112/",
"access_type" : "LOCKED",
"article_number" : "10093112",
"authors" : {
"authors" : [
{
"affiliation" : "Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer, Beijing Jiaotong University, Beijing, China",
"authorAffiliations" : {
"authorAffiliation" : [
"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer, Beijing Jiaotong University, Beijing, China"
]
},
"authorUrl" : "https://ieeexplore.ieee.org/author/37591668800",
"author_order" : 1,
"full_name" : "Yongzhong He",
"id" : 37591668800
},
{
"affiliation" : "Beijing Jiaotong University, Beijing, China",
"authorAffiliations" : {
"authorAffiliation" : [
"Beijing Jiaotong University, Beijing, China"
]
},
"authorUrl" : "https://ieeexplore.ieee.org/author/270894766812037",
"author_order" : 2,
"full_name" : "Yiming Wang",
"id" : 270894766812037
},
{
"affiliation" : "Department of Computer Science and Engineering, The Pennsylvania State University, State College, PA, USA",
"authorAffiliations" : {
"authorAffiliation" : [
"Department of Computer Science and Engineering, The Pennsylvania State University, State College, PA, USA"
]
},
"authorUrl" : "https://ieeexplore.ieee.org/author/37281408400",
"author_order" : 3,
"full_name" : "Sencun Zhu",
"id" : 37281408400
},
{
"affiliation" : "Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer, Beijing Jiaotong University, Beijing, China",
"authorAffiliations" : {
"authorAffiliation" : [
"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer, Beijing Jiaotong University, Beijing, China"
]
},
"authorUrl" : "https://ieeexplore.ieee.org/author/37292860000",
"author_order" : 4,
"full_name" : "Wei Wang",
"id" : 37292860000
},
{
"affiliation" : "Beijing Jiaotong University, Beijing, China",
"authorAffiliations" : {
"authorAffiliation" : [
"Beijing Jiaotong University, Beijing, China"
]
},
"authorUrl" : "https://ieeexplore.ieee.org/author/37088409311",
"author_order" : 5,
"full_name" : "Yunjia Zhang",
"id" : 37088409311
},
{
"affiliation" : "Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer, Beijing Jiaotong University, Beijing, China",
"authorAffiliations" : {
"authorAffiliation" : [
"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer, Beijing Jiaotong University, Beijing, China"
]
},
"authorUrl" : "https://ieeexplore.ieee.org/author/37086426445",
"author_order" : 6,
"full_name" : "Qiang Li",
"id" : 37086426445
},
{
"affiliation" : "Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China",
"authorAffiliations" : {
"authorAffiliation" : [
"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"
]
},
"authorUrl" : "https://ieeexplore.ieee.org/author/38104871800",
"author_order" : 7,
"full_name" : "Aimin Yu",
"id" : 38104871800
}
]
},
"citing_paper_count" : 1,
"citing_patent_count" : 0,
"content_type" : "Journals",
"doi" : "10.1109/TDSC.2023.3264567",
"download_count" : 195,
"end_page" : "919",
"html_url" : "https://ieeexplore.ieee.org/document/10093112/",
"index_terms" : {
"author_terms" : {
"terms" : [
"Developer logs",
"NVD",
"patch",
"versions",
"vulnerability"
]
},
"dynamic_index_terms" : {
"terms" : [
"False Positive",
"False Negative",
"Source Code",
"Data Compression",
"Cybersecurity",
"Security System",
"Total Number Of Positives",
"Software Version",
"Package Version",
"Open-source Software",
"Open Software",
"Open Coding",
"Proof Of Concept",
"Precision And Recall",
"Earlier Version",
"Exact Match",
"Example In Fig",
"Denial Of Service",
"Denial-of-service Attacks",
"Vulnerability Of Systems",
"Continuous Updating",
"Open-source Projects",
"False Negative Cases",
"Partial Match",
"Code Blocks",
"Vulnerability Functions",
"Log Information",
"Clone Detection",
"Code Clones",
"Stable Version",
"Bug Fixes",
"Running Example",
"Types Of Vulnerabilities",
"False Positive Cases",
"False Positive Rate",
"Computer System"
]
},
"ieee_terms" : {
"terms" : [
"Software",
"Source coding",
"Codes",
"Databases",
"Linux",
"Kernel",
"Computer security"
]
}
},
"insert_date" : "20230405",
"is_number" : 10472294,
"issn" : "2160-9209",
"issue" : "2",
"pdf_url" : "https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10093112",
"publication_date" : "March-April 2024",
"publication_number" : 8858,
"publication_title" : "IEEE Transactions on Dependable and Secure Computing",
"publication_year" : 2024,
"publisher" : "IEEE",
"rank" : 1,
"start_page" : "905",
"title" : "Automatically Identifying CVE Affected Versions With Patches and Developer Logs",
"volume" : "21"
}
],
"total_records" : 1,
"total_searched" : 6236569
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment