Documents

DOI

A popular form of software reuse is the use of open source software libraries hosted on centralized code repositories, such as Maven or npm. Developers only need to declare dependencies to external libraries, and automated tools make them available to the workspace of the project. Recent incidents, such as the Equifax data breach and the leftpad package removal, demonstrate the difficulty in assessing the severity, impact and spread of bugs in dependency networks. While dependency checkers are being adapted as a counter measure, they only provide indicative information. To remedy this situation, we propose a fine-grained dependency network that goes beyond packages and into call graphs. The result is a versioned ecosystem-level call graph. In this paper, we outline the process to construct the proposed graph and present a preliminary evaluation of a security issue from a core package to an affected client application.
Original languageEnglish
Title of host publicationProceedings of 40th International Conference on Software Engineering
Subtitle of host publicationNew Ideas and Emerging Results Track
Number of pages4
DOIs
StateAccepted/In press - 2018
EventICSE 2018 - Gothenburg, Sweden
Duration: 27 May 20183 Jun 2018
Conference number: 40
https://www.icse2018.org/

Conference

ConferenceICSE 2018
CountrySweden
CityGothenburg
Period27/05/183/06/18
Internet address

    Research areas

  • dependency management, software ecosystem, dependencies, call graph, program analysis

ID: 38776307