Skip to main content

Showing 1–15 of 15 results for author: Sabetta, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.05200  [pdf, other

    cs.CR cs.SE

    Journey to the Center of Software Supply Chain Attacks

    Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, Olivier Barais

    Abstract: This work discusses open-source software supply chain attacks and proposes a general taxonomy describing how attackers conduct them. We then provide a list of safeguards to mitigate such attacks. We present our tool "Risk Explorer for Software Supply Chains" to explore such information and we discuss its industrial use-cases.

    Submitted 11 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.04008

  2. arXiv:2108.05115  [pdf, ps, other

    cs.SE

    The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application

    Authors: Serena Elisa Ponta, Wolfram Fischer, Henrik Plate, Antonino Sabetta

    Abstract: Software reuse may result in software bloat when significant portions of application dependencies are effectively unused. Several tools exist to remove unused (byte)code from an application or its dependencies, thus producing smaller artifacts and, potentially, reducing the overall attack surface. In this paper we evaluate the ability of three debloating tools to distinguish which dependency class… ▽ More

    Submitted 11 August, 2021; originally announced August 2021.

  3. arXiv:2105.03346  [pdf, other

    cs.SE cs.CR cs.LG

    Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers

    Authors: Therese Fehrer, Rocío Cabrera Lozoya, Antonino Sabetta, Dario Di Nucci, Damian A. Tamburri

    Abstract: The sources of reliable, code-level information about vulnerabilities that affect open-source software (OSS) are scarce, which hinders a broad adoption of advanced tools that provide code-level detection and assessment of vulnerable OSS dependencies. In this paper, we study the extent to which the output of off-the-shelf static code analyzers can be used as a source of features to represent comm… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Comments: Submitted to ESEC/FSE 2021, Industry Track

  4. arXiv:2103.13375  [pdf, other

    cs.SE cs.CR cs.LG

    Automated Map** of Vulnerability Advisories onto their Fix Commits in Open Source Repositories

    Authors: Daan Hommersom, Antonino Sabetta, Bonaventura Coppola, Dario Di Nucci, Damian A. Tamburri

    Abstract: The lack of comprehensive sources of accurate vulnerability data represents a critical obstacle to studying and understanding software vulnerabilities (and their corrections). In this paper, we present an approach that combines heuristics stemming from practical experience and machine-learning (ML) - specifically, natural language processing (NLP) - to address this problem. Our method consists of… ▽ More

    Submitted 10 May, 2023; v1 submitted 24 March, 2021; originally announced March 2021.

  5. arXiv:2103.03331  [pdf, other

    cs.SE

    Secure Software Development in the Era of Fluid Multi-party Open Software and Services

    Authors: Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci

    Abstract: Pushed by market forces, software development has become fast-paced. As a consequence, modern development projects are assembled from 3rd-party components. Security & privacy assurance techniques once designed for large, controlled updates over months or years, must now cope with small, continuous changes taking place within a week, and happening in sub-components that are controlled by third-part… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 7 pages, 1 figure, to be published in Proceedings of International Conference on Software Engineering - New Ideas and Emerging Results

    ACM Class: D.2.0; D.2.13

  6. arXiv:2008.04568  [pdf, other

    cs.SE cs.CR

    Code-based Vulnerability Detection in Node.js Applications: How far are we?

    Authors: Bodin Chinthanet, Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Raula Gaikovina Kula, Takashi Ishio, Kenichi Matsumoto

    Abstract: With one of the largest available collection of reusable packages, the JavaScript runtime environment Node.js is one of the most popular programming application. With recent work showing evidence that known vulnerabilities are prevalent in both open source and industrial software, we propose and implement a viable code-based vulnerability detection tool for Node.js applications. Our case study lis… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

  7. arXiv:1911.07620  [pdf, other

    cs.SE cs.CL

    Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits

    Authors: Achyudh Ram, Ji Xin, Meiyappan Nagappan, Yaoliang Yu, Rocío Cabrera Lozoya, Antonino Sabetta, Jimmy Lin

    Abstract: Public vulnerability databases such as CVE and NVD account for only 60% of security vulnerabilities present in open-source projects, and are known to suffer from inconsistent quality. Over the last two years, there has been considerable growth in the number of known vulnerabilities across projects available in various repositories such as NPM and Maven Central. Such an increasing risk calls for a… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

  8. Commit2Vec: Learning Distributed Representations of Code Changes

    Authors: Rocìo Cabrera Lozoya, Arnaud Baumann, Antonino Sabetta, Michele Bezzi

    Abstract: Deep learning methods, which have found successful applications in fields like image classification and natural language processing, have recently been applied to source code analysis too, due to the enormous amount of freely available source code (e.g., from open-source software repositories). In this work, we elaborate upon a state-of-the-art approach to the representation of source code that… ▽ More

    Submitted 17 November, 2021; v1 submitted 18 November, 2019; originally announced November 2019.

    Comments: A previous version of this paper had the following title: "patch2vec: Distributed Representation of Code Changes"; we updated the title to distinguish it from another pre-existing approach with the same name. An improved version of this work appeared in Springer Nature Computer Science, 2021 (https://doi.org/10.1007/s42979-021-00566-z)

    Journal ref: SN Computer Science volume 2, Article number: 150 (2021)

  9. arXiv:1902.02595  [pdf, other

    cs.SE cs.CR cs.LG

    A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software

    Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont

    Abstract: Advancing our understanding of software vulnerabilities, automating their identification, the analysis of their impact, and ultimately their mitigation is necessary to enable the development of software that is more secure. While operating a vulnerability assessment tool that we developed and that is currently used by hundreds of development units at SAP, we manually collected and curated a datase… ▽ More

    Submitted 19 March, 2019; v1 submitted 7 February, 2019; originally announced February 2019.

    Comments: This is a pre-print version of the paper that appears in the proceedings of The 16th International Conference on Mining Software Repositories (MSR), Data Showcase track

    Journal ref: Proceedings of The 16th International Conference on Mining Software Repositories (Data Showcase track), 2019

  10. arXiv:1808.09753  [pdf, other

    cs.SE cs.CR

    Vulnerable Open Source Dependencies: Counting Those That Matter

    Authors: Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci

    Abstract: BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies. AIMS: In this paper we aim to present a precise methodology, that combines the code-based analysis of patches with information on build, test, update dates, and group extracted from the very code r… ▽ More

    Submitted 29 August, 2018; originally announced August 2018.

    Comments: This is a pre-print of the paper that appears, with the same title, in the proceedings of the 12th International Symposium on Empirical Software Engineering and Measurement, 2018

  11. arXiv:1807.02458  [pdf, other

    cs.CR

    A Practical Approach to the Automatic Classification of Security-Relevant Commits

    Authors: Antonino Sabetta, Michele Bezzi

    Abstract: The lack of reliable sources of detailed information on the vulnerabilities of open-source software (OSS) components is a major obstacle to maintaining a secure software supply chain and an effective vulnerability management process. Standard sources of advisories and vulnerability data, such as the National Vulnerability Database (NVD), are known to suffer from poor coverage and inconsistent qual… ▽ More

    Submitted 6 July, 2018; originally announced July 2018.

    Comments: Published in the Proc. of the 34th IEEE International Conference on Software Maintenance and Evolution (ICSME) 2018

  12. arXiv:1806.05893  [pdf, other

    cs.CR cs.SE

    Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software

    Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta

    Abstract: The use of open-source software (OSS) is ever-increasing, and so is the number of open-source vulnerabilities being discovered and publicly disclosed. The gains obtained from the reuse of community-developed libraries may be offset by the cost of detecting, assessing, and mitigating their vulnerabilities in a timely fashion. In this paper we present a novel method to detect, assess and mitigate… ▽ More

    Submitted 12 July, 2018; v1 submitted 15 June, 2018; originally announced June 2018.

    Comments: To appear in the Proc. of the 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME) Added: - acknowledgements - citation to Dashevskyi et al. (TSE 2018), DOI: 10.1109/TSE.2018.2816033

  13. TestREx: a Framework for Repeatable Exploits

    Authors: Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta

    Abstract: Web applications are the target of many well known exploits and also a fertile ground for the discovery of security vulnerabilities. Yet, the success of an exploit depends both on the vulnerability in the application source code and the environment in which the application is deployed and run. As execution environments are complex (application servers, databases and other supporting applications),… ▽ More

    Submitted 10 September, 2017; originally announced September 2017.

    Journal ref: Int. J. Software Tools for Technology Transfer, 2017

  14. arXiv:1504.04971  [pdf, other

    cs.CR cs.SE

    Impact assessment for vulnerabilities in open-source software libraries

    Authors: Henrik Plate, Serena Elisa Ponta, Antonino Sabetta

    Abstract: Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application. Upon the disclosure of every new vulnerability, the application vendor has to decide whether it is exploitable in his particular usage context, hence, whether users require an urgent application patch c… ▽ More

    Submitted 21 April, 2015; v1 submitted 20 April, 2015; originally announced April 2015.

  15. Machine-Readable Privacy Certificates for Services

    Authors: Marco Anisetti, Claudio A. Ardagna, Michele Bezzi, Ernesto Damiani, Antonino Sabetta

    Abstract: Privacy-aware processing of personal data on the web of services requires managing a number of issues arising both from the technical and the legal domain. Several approaches have been proposed to matching privacy requirements (on the clients side) and privacy guarantees (on the service provider side). Still, the assurance of effective data protection (when possible) relies on substantial human ef… ▽ More

    Submitted 26 July, 2013; originally announced July 2013.

    Comments: 20 pages, 6 figures