Show simple item record

dc.contributor.authorBen Othmane, L
dc.contributor.authorChehrazi, G
dc.contributor.authorBodden, E
dc.contributor.authorTsalovski, P
dc.contributor.authorBrucker, AD
dc.date.accessioned2019-12-09T10:59:54Z
dc.date.issued2016-09-27
dc.description.abstractFinding and fixing software vulnerabilities have become a major struggle for most software development companies. While generally without alternative, such fixing efforts are a major cost factor, which is why companies have a vital interest in focusing their secure software development activities such that they obtain an optimal return on this investment. We investigate, in this paper, quantitatively the major factors that impact the time it takes to fix a given security issue based on data collected automatically within SAP’s secure development process, and we show how the issue fix time could be used to monitor the fixing process. We use three machine learning methods and evaluate their predictive power in predicting the time to fix issues. Interestingly, the models indicate that vulnerability type has less dominant impact on issue fix time than previously believed. The time it takes to fix an issue instead seems much more related to the component in which the potential vulnerability resides, the project related to the issue, the development groups that address the issue, and the closeness of the software release date. This indicates that the software structure, the fixing processes, and the development groups are the dominant factors that impact the time spent to address security issues. SAP can use the models to implement a continuous improvement of its secure software development process and to measure the impact of individual improvements. The development teams at SAP develop different types of software, adopt different internal development processes, use different programming languages and platforms, and are located in different cities and countries. Other organizations, may use the results—with precaution—and be learning organizations.en_GB
dc.identifier.citationVol. 2, pp. 107 - 124en_GB
dc.identifier.doi10.1007/s41019-016-0019-8
dc.identifier.urihttp://hdl.handle.net/10871/40025
dc.language.isoenen_GB
dc.publisherSpringerOpenen_GB
dc.rights© The Author(s) 2016 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.en_GB
dc.titleTime for addressing software security issues: prediction models and impacting factorsen_GB
dc.typeArticleen_GB
dc.date.available2019-12-09T10:59:54Z
dc.identifier.issn2364-1185
dc.descriptionThis is the author accepted manuscript. The final version is available from the publisher via the DOI in this recorden_GB
dc.identifier.journalData Science and Engineeringen_GB
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/en_GB
dcterms.dateAccepted2016-08-29
rioxxterms.versionVoRen_GB
rioxxterms.licenseref.startdate2016-08-29
rioxxterms.typeJournal Article/Reviewen_GB
refterms.dateFCD2019-12-09T10:55:29Z
refterms.versionFCDAM
refterms.dateFOA2019-12-09T10:59:57Z
refterms.panelBen_GB
refterms.depositExceptionpublishedGoldOA
refterms.depositExceptionExplanationhttps://doi.org/10.1007/s41019-016-0019-8


Files in this item

This item appears in the following Collection(s)

Show simple item record

© The Author(s) 2016 Open Access
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Except where otherwise noted, this item's licence is described as © The Author(s) 2016 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.