SECURITY SMELL STUDIES IN JAVA LANGUAGE APPLICATIONS

Security smells found in code could be a subtle sign of security vulnerability in the future. Developers could do security code review to find those signs, however it takes a lot of time in a large codebase. In this research, we focus on using 2 different techniques: Mining Software Repository (MSR)...

Full description

Saved in:
Bibliographic Details
Main Author: Paramitha, Ranindya
Format: Theses
Language:Indonesia
Subjects:
Online Access:https://digilib.itb.ac.id/gdl/view/63812
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:63812
spelling id-itb.:638122022-03-17T10:20:47ZSECURITY SMELL STUDIES IN JAVA LANGUAGE APPLICATIONS Paramitha, Ranindya Teknik (Rekayasa, enjinering dan kegiatan berkaitan) Indonesia Theses security smell, smelly file, graph analysis, mining software repository INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/63812 Security smells found in code could be a subtle sign of security vulnerability in the future. Developers could do security code review to find those signs, however it takes a lot of time in a large codebase. In this research, we focus on using 2 different techniques: Mining Software Repository (MSR) analysis for detecting smelly files using metrics and graph analysis for finding security smells. Those techniques are expected to support security code review and increase its efficiency. MSR analysis found that ordinal value of LOC, commit count, and author count have positive correlation with the likelihood of a file being smelly. Because those correlations are not completely definitive, we also analyzed the feature combinations and found that combination of ordinal LOC and commit count has the highest positive correlation score, followed by combination of all 3 ordinal features. We then implemented a simple tool and used it to validate the analysis. This validation correlations between smelly files with the occurrence of identified security smells and known security vulnerability. In association with reducing manual security code review time, we found that usage of MSR analysis could reach 84.63% review time reduction. For security smells extraction and detection, we did some literature researches and empirical studies to classify 7 security smells for Java projects. We then did analysis about code representations, mostly about graph, and after that, we built 2 tool modules that utilized graph analysis. Using the graph analysis tools, we found 7 security smells from 2 test projects. Finally, after evaluating both techniques’ performances, we concluded that both techniques could not replace security vulnerability detection. However, both of these techniques could be used as complementary or supporting technique to analyze security risks, especially in risk-averse software development. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
topic Teknik (Rekayasa, enjinering dan kegiatan berkaitan)
spellingShingle Teknik (Rekayasa, enjinering dan kegiatan berkaitan)
Paramitha, Ranindya
SECURITY SMELL STUDIES IN JAVA LANGUAGE APPLICATIONS
description Security smells found in code could be a subtle sign of security vulnerability in the future. Developers could do security code review to find those signs, however it takes a lot of time in a large codebase. In this research, we focus on using 2 different techniques: Mining Software Repository (MSR) analysis for detecting smelly files using metrics and graph analysis for finding security smells. Those techniques are expected to support security code review and increase its efficiency. MSR analysis found that ordinal value of LOC, commit count, and author count have positive correlation with the likelihood of a file being smelly. Because those correlations are not completely definitive, we also analyzed the feature combinations and found that combination of ordinal LOC and commit count has the highest positive correlation score, followed by combination of all 3 ordinal features. We then implemented a simple tool and used it to validate the analysis. This validation correlations between smelly files with the occurrence of identified security smells and known security vulnerability. In association with reducing manual security code review time, we found that usage of MSR analysis could reach 84.63% review time reduction. For security smells extraction and detection, we did some literature researches and empirical studies to classify 7 security smells for Java projects. We then did analysis about code representations, mostly about graph, and after that, we built 2 tool modules that utilized graph analysis. Using the graph analysis tools, we found 7 security smells from 2 test projects. Finally, after evaluating both techniques’ performances, we concluded that both techniques could not replace security vulnerability detection. However, both of these techniques could be used as complementary or supporting technique to analyze security risks, especially in risk-averse software development.
format Theses
author Paramitha, Ranindya
author_facet Paramitha, Ranindya
author_sort Paramitha, Ranindya
title SECURITY SMELL STUDIES IN JAVA LANGUAGE APPLICATIONS
title_short SECURITY SMELL STUDIES IN JAVA LANGUAGE APPLICATIONS
title_full SECURITY SMELL STUDIES IN JAVA LANGUAGE APPLICATIONS
title_fullStr SECURITY SMELL STUDIES IN JAVA LANGUAGE APPLICATIONS
title_full_unstemmed SECURITY SMELL STUDIES IN JAVA LANGUAGE APPLICATIONS
title_sort security smell studies in java language applications
url https://digilib.itb.ac.id/gdl/view/63812
_version_ 1822932256745848832