Skip to main content

Security Introspection for Software Reuse

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 09 Issue: 05 | May 2022

p-ISSN: 2395-0072

www.irjet.net

Security Introspection for Software Reuse Sheleshma Shukla1, Dr.Dhirendra Pandey2 1, 2 Department

of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh ---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - Both scholars and practitioners agree that

system level. The "local" nature of reusability vs the "global" nature of safety and security raises many challenges. The "local" nature of reusable components vs the "global" aspect of protection and wellbeing raises many challenges. The inventor of a component is difficult to know ahead of time the precise safety or security context in which it would be used, finding it challenging to develop well with appropriate attributes.

software reuse is a good idea. By depending on established relationships, a system can become more secure, or more insecure, by exposing a wider security vulnerabilities via susceptible repositories. In order to build on a previous study and shed further light on the topic, we look into the link between reusability and security flaws. We utilize a multiplecase research to examine 1244 open-source projects in order to investigate and debate the distribution of security vulnerabilities in code generated by a project team as well as code reproduced through dependents. For this, we take into account both possible vulnerabilities discovered through static analysis and publicly published flaws. The results indicate that the amount of possible vulnerabilities in both native and reused code is linked to the scale of a development. Furthermore, we noticed that the number of dependent and the number of vulnerability are closely related. According to our research, source code reuse is neither a panacea for addressing vulnerabilities nor a terrifying werewolf that entails an excessive number of them. Key Words: Vulnerabilities, Hazardous, Software Reuse etc.

Flexibility,

A software engineer is more likely to create a component than just a cyber-security or risk specialist. It's not always a smart idea to incorporate security features into elements since it blends functional requirement attributes, making repurposing more difficult. We've taken an as double approach to the problem. Prototype techniques for designing independent security rules and safety continuation; separation of responsibilities principle for decoupling nonfunctional features.

2. LITERATURE REVIEW 2.1 Security Concern:

Security

Reusing software isn't a panacea. Some of its flaws are described as "hazardous" rather than "concerning," in the sense that one of the most significant adverse effects is the potential for security problems. In a study involving Kula et al. [1], it was found that, although more open-source software systems exist, over 80% of the systems relied on out-of-date external libraries, and 69% of the systems. Any security concerns presented were unknown to the developers questioned. Furthermore, in the state of New York, Snyk discusses the troubling findings of the OpenSource Security report.The number of disclosed cases increased by 88% between 2017 and 2019. Open-source libraries have vulnerabilities.

1. INTRODUCTION Modern component-based and service-oriented systems make use of reuse to provide multiple productivity and costcutting benefits. Instead of building entire applications and systems from the ground up, they are instead assembled from existing and newly developed components and services, reducing money and time to market. However, when such systems contain safety and security features, these gains are outweighed by a number of problems. (Although safety and security are two distinct domains, we will treat them together in this work wherever possible.) The link between software reuse and safety and security has at least two major difficulties. The attainment of flexibility is directly linked to reuse (see, for example, [1] for an economic analysis of flexibility in reuse). Traditional security and safety assurance concepts for monolithic systems, which rely on fixed, inflexible structures ideal for the types of analyses employed in privacy and protection assessment, approval, and accreditation, are irreconcilable with mobility.

2.2 Detecting Vulnerable code: Pham et al. [3] suggested to the automated identification of non-useful of vulnerable codes in the area of finding susceptible codes. The authors introduced SecureSync, an open-source programme that analyses previously revealed vulnerabilities and they recommend systems and builds models to recognize similar suspicious trends in the data from different systems.

Because both safety and security are emergent aspects of a system [2], ensuring individual components of the system is extremely challenging. Assurance is usually performed at the

© 2022, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 3328


Turn static files into dynamic content formats.

Create a flipbook
Security Introspection for Software Reuse by IRJET Journal - Issuu