The Secret Life of CVEs

📅 2023-05-01
🏛️ IEEE Working Conference on Mining Software Repositories
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study investigates the vulnerability lifetime—the time interval from CVE disclosure to patching—in software projects, systematically analyzing how programming language choice, project characteristics, and intrinsic CVE attributes influence repair latency. Methodologically, it pioneers the application of survival analysis (Cox proportional hazards modeling and Kaplan–Meier estimation) to CVE lifecycle modeling, integrating large-scale CVE databases with cross-language and cross-project feature engineering to uncover nonlinear effects of multidimensional risk factors. Results demonstrate that memory-safe languages (e.g., Rust), highly active maintenance projects, and higher CVSS severity scores significantly accelerate patching. The proposed model achieves substantially improved prediction accuracy over baseline approaches. This work contributes an interpretable, reusable, empirically grounded framework—supported by quantitative evidence—for prioritizing vulnerability response efforts in practice.

Technology Category

Application Category

📝 Abstract
The Common Vulnerabilities and Exposures (CVEs) system is a reference method for documenting publicly known information security weaknesses and exposures. This paper presents a study of the lifetime of CVEs in software projects and the risk factors affecting their existence. The study uses survival analysis to examine how features of programming languages, projects, and CVEs themselves impact the lifetime of CVEs. We suggest avenues for future research to investigate the effect of various factors on the resolution of vulnerabilities.
Problem

Research questions and friction points this paper is trying to address.

Analyzing CVE lifetime in software projects
Identifying risk factors affecting vulnerability existence
Investigating programming language impact on CVE resolution
Innovation

Methods, ideas, or system contributions that make the work stand out.

Survival analysis for CVE lifetime study
Examining programming language impact on CVEs
Investigating project features affecting vulnerability resolution
🔎 Similar Papers
No similar papers found.
Piotr Przymus
Piotr Przymus
Nicolaus Copernicus University in Toruń
software engineeringdata miningmachine learning
M
Mikołaj Fejzer
Nicolaus Copernicus University, Toruń, Poland
J
Jakub Narębski
Nicolaus Copernicus University, Toruń, Poland
K
K. Stencel
University of Warsaw, Warsaw, Poland