Toward Validation of Textual Information Retrieval Techniques for Software Weaknesses

09/05/2018
by   Jukka Ruohonen, et al.
0

This paper presents a preliminary validation of common textual information retrieval techniques for mapping unstructured software vulnerability information to distinct software weaknesses. The validation is carried out with a dataset compiled from four software repositories tracked in the Snyk vulnerability database. According to the results, the information retrieval techniques used perform unsatisfactorily compared to regular expression searches. Although the results vary from a repository to another, the preliminary validation presented indicates that explicit referencing of vulnerability and weakness identifiers is preferable for concrete vulnerability tracking. Such referencing allows the use of keyword-based searches, which currently seem to yield more consistent results compared to information retrieval techniques. Further validation work is required for improving the precision of the techniques, however.

READ FULL TEXT
research
07/01/2018

Information Retrieval in the Cloud

There has been a recent trend to migrate IT infrastructure into the clou...
research
12/12/2018

Searching for Relevant Lessons Learned Using Hybrid Information Retrieval Classifiers: A Case Study in Software Engineering

The lessons learned (LL) repository is one of the most valuable sources ...
research
09/16/2022

Web Application Weakness Ontology Based on Vulnerability Data

Web applications are becoming more ubiquitous. All manner of physical de...
research
03/23/2016

CONDITOR1: Topic Maps and DITA labelling tool for textual documents with historical information

Conditor is a software tool which works with textual documents containin...
research
07/24/2020

Considerations for Eye Tracking Experiments in Information Retrieval

In this survey I discuss ophthalmic neurophysiology and the experimental...
research
08/14/2020

On single server private information retrieval in a coding theory perspective

In this paper, we present a new perspective of single server private inf...

Please sign up or login with your details

Forgot password? Click here to reset