Static Code Analysis To Detect Software Security V
Static Code Analysis To Detect Software Security V
net/publication/221548746
CITATIONS READS
25 1,618
4 authors, including:
Lars Lundberg
Blekinge Institute of Technology
195 PUBLICATIONS 1,301 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Kai Petersen on 19 May 2015.
1
Authors are also affiliated with Ericsson AB, Box 518, SE-37123 Karlskrona, Sweden, [email protected],
[email protected]
identification and classification of faults identified by a suggests that about 5% of the tool generated warnings
static code analysis tool (SAT). The study has been have been security faults that need correction.
conducted as an industry experiment with 34
developers. Furthermore, the perceived confidence in
the answers from a single developer has been asked for 3. Research Method
to control whether the answers can be considered as not
random. 3.1 Variables
We therefore want to answer if SATs are useful for
Two different types of variables are usually
average developers as a vulnerability detector, if
considered when conducting experiments, namely
developers with certain experience get better results
independent variables and dependent variables.
and if the developers can identify when they need aid in
The independent variables (or treatments) are what
interpreting the SAT.
the researcher is controlling, and the dependent
In section 1 the introduction and research problem is
variables are measured outcomes. In this case, the
presented. Section 2 explains the background and
variable experience is controlled. As outcome variables
related work In Section 3 our research method is
we consider the ratio of different fault types classified
explained, followed by the results in Section 4. In
correctly by the developers (see Figure 1).
Section 5 we discuss the impact and possible reasons of
our result followed by our conclusions in Section 6.