Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

xVDB: A High-Coverage Approach for Constructing a Vulnerability Database

Full metadata record
DC Field Value Language
dc.contributor.authorHong, Hyunji-
dc.contributor.authorWoo, Seunghoon-
dc.contributor.authorChoi, Eunjin-
dc.contributor.authorChoi, Jihyun-
dc.contributor.authorLee, Heejo-
dc.date.accessioned2022-09-25T13:40:13Z-
dc.date.available2022-09-25T13:40:13Z-
dc.date.created2022-09-23-
dc.date.issued2022-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/144008-
dc.description.abstractSecurity patches play an important role in detecting and fixing one-day vulnerabilities. However, collecting abundant security patches from diverse data sources is not a simple task. This is because (1) each data source provides vulnerability information in a different way and (2) many security patches cannot be directly collected from Common Vulnerabilities and Exposures (CVE) information (e. g., National Vulnerability Database (NVD) references). In this paper, we propose a high-coverage approach that collects known security patches by tracking multiple data sources. Specifically, we considered the following three data sources: repositories (e. g., GitHub), issue trackers (e. g., Bugzilla), and Q&A sites (e. g., Stack Overflow). From the data sources, we gather even security patches that cannot be collected by considering only CVE information (i. e., previously untracked security patches). In our experiments, we collected 12,432 CVE patches from repositories and issue trackers, and 12,458 insecure posts from Q&A sites. We could collect at least four times more CVE patches than those collected in existing approaches, which demonstrates the efficacy of our approach. The collected security patches serves as a database on a public website (i. e., IoTcube) to proceed with the detection of vulnerable code clones.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titlexVDB: A High-Coverage Approach for Constructing a Vulnerability Database-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Heejo-
dc.identifier.doi10.1109/ACCESS.2022.3197786-
dc.identifier.scopusid2-s2.0-85136126828-
dc.identifier.wosid000842983900001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.10, pp.85050 - 85063-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume10-
dc.citation.startPage85050-
dc.citation.endPage85063-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorCodes-
dc.subject.keywordAuthorDatabases-
dc.subject.keywordAuthorOpen source software-
dc.subject.keywordAuthorOpen source software-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorSoft sensors-
dc.subject.keywordAuthorSoftware development management-
dc.subject.keywordAuthorSupply chains-
dc.subject.keywordAuthorsoftware security-
dc.subject.keywordAuthorvulnerability database-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hee jo photo

Lee, Hee jo
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE