
Factors Impacting Effort to Fix Security Vulnerabilities Study
Explore the study on factors influencing the time taken to fix security vulnerabilities in software development processes. The research delves into identifying key factors impacting the effort required to address vulnerabilities, with insights from security experts, developers, and coordinators.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Factors Impacting the Effort Required to Fix Security Vulnerabilities Lotfi ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim Bruker, Philip Miseldine 09 September 2015
Vulnerabilities Fixing Process at SAP Fixing Processes Released software Under development software Fixing process for security testing SAP security response process Participants include Central security teams IMS maintenance organization Security experts Developers . 2
Introduction - The Problem Goal: Predict the time to spend on analyzing and fixing a given vulnerability? Let t = f (x1, xj) What are x1 xj ? 3
Introduction - Motivation Cost of implementing security fixes Vulnerabilities Dead Code (unused methods) Average fix time (min) 2.6 Poor logging: system output stream 2.9 XSS (stored) 9.6 Lack of authorization check 6.9 Unsafe threading 8.5 Null dereference 10.2 SQL injection 97.5 Cornell, RSA 2012 The only factor considered is vulnerability type What about the others? 4
The Study - Scope Goal: Identify the factors that impact the fixing time Method: Interview participants in the vulnerability fixing process Result: The major factors that impact the fixing time 5
The Study - Conduct of the Study Preparation of the questions Selection of participants Interviews were conducted from 8 to 12 Dec. 2014 Interviews Transcribe the interviews Number of participants 12 (12 hours) 9 from Germany and 3 from India Security experts, developers, coordinators, Code the interviews project leaders Consolidate the data NetWeaver experts, custom application experts, application experts Analyze the results 6
The Study - Conduct of the Study Cont. Preparation of the questions Selection of participants Each interview is transcribed into about 16 pages Interviews Identified 21 code classes from 3 sample interviews Transcribe the interviews Coded each transcript in a report of 4 pages Code the interviews Each interviewee is asked to review the report of his interview Consolidate the data Analyze the results 7
The Study - Conduct of the Study - cont. Coding examples Code injections are difficult to fix vulnerability type Vulnerability characteristics If the function module is the same in all these 12 or 20 releases [ ] , then I just have to do one correction Similarity of code in the different releases Software structure 8
Factors that Impact the Vulnerability Fix time Factor categories # of factors Freq. Vulnerabilities characteristics 6 9 Software structure 19 10 Technology diversification 3 5 Communication and collaboration 7 8 Availability and quality of information and documentation 9 9 Experience and knowledge 12 11 Code analysis tool 4 4 Other 4 4 9
Observed Fixing Process Case 1: Analysis and design of global solution Implemen- tation Release Test Case 2: Analysis and design area solution Pre-analysis Case 3: Analysis and design local solution Implemen- tation Test Release Iterations among successive steps are performed implicitly / not marked 10
Take-Away Vulnerability type is one among many factors (65) that impact the vulnerability fix time The 8 factor categories reflect the main areas for improving the vulnerability fixing processes E.g., software structure, training, etc. 11
Threats to Validity Control of the threats to the validity of the results The interviewees are diversified 2 researchers coded each interview and the results are consolidated The participants validated the reports of their interviews Weaknesses Used one method to identify the factors interviewing experts Interviewed only 2 developers External use Diversity of product areas Distribution of development teams 12
Lessons learned The main interview questions shall help the interviewees to tell their own stories What questions are inefficient to enumerate elements The participants sometimes have their own messages to deliver Vulnerability fixing processes are as many as the process participants Do not try to base the fix effort estimate on a process 13
Thank you lotfi.ben.othmane@sit.fraunhofer.de 14