On the evolution of mobile computing software systems and C/C++ vulnerable code: Empirical investigation

Saleh M. Alnaeli, Melissa Sarnowski, Md Sayedul Aman, Kumar Yelamarthi, Ahmed Abdelgawad, Haowen Jiang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

A study is presented that examines the distribution and the usage of some unsafe functions that are known to cause security vulnerabilities in 15 software systems, written in C/C++. The systems are commonly used for mobile computing, and they comprise almost six million lines of code. A tool that uses a static analysis approach is applied to each system, and the number of calls to unsafe functions is determined and tabulated. The results show that vulnerable functions such as strcmp, strlen, and memcpy represent the vast majority of used unsafe functions that are banned by many companies (e.g., Microsoft) in the studied systems. This fact can help software trainers better design and plan training courses and materials on secure coding practices for software developers. Additionally, findings can help software engineers to conduct more effective refactoring processes that help to clean software systems from vulnerable code, and focus primarily on the removal of vulnerable code with higher usage for better outcomes. The historical data for a number of systems, subset, is presented over a five-year period. The data shows that few of the systems examined are increasing the number of unsafe function calls over time. This is somewhat contradictory to the literature, which claims that the use of vulnerable functions is decreasing in software systems. This fact demands that more attention and effort from software engineering and mobile computing communities be put towards addressing this phenomenon.

Original languageEnglish
Title of host publication2016 IEEE 7th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2016
EditorsHimadri Nath Saha, Satyajit Chakrabarti
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509014965
DOIs
StatePublished - Dec 7 2016
Event7th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2016 - New York City, United States
Duration: Oct 20 2016Oct 22 2016

Publication series

Name2016 IEEE 7th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2016

Conference

Conference7th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2016
Country/TerritoryUnited States
CityNew York City
Period10/20/1610/22/16

Keywords

  • Unsafe functions
  • alternatives
  • programming-style
  • security
  • vulnerability

Fingerprint

Dive into the research topics of 'On the evolution of mobile computing software systems and C/C++ vulnerable code: Empirical investigation'. Together they form a unique fingerprint.

Cite this