Show simple item record

dc.contributor.authorMohayeji, Hamiden
dc.contributor.authorAgaronian, Andreien
dc.contributor.authorConstantinou, Elenien
dc.contributor.authorZannone, Nicolaen
dc.contributor.authorSerebrenik, Alexanderen
dc.coverage.spatialPiscataway, NJ.en
dc.creatorMohayeji, Hamiden
dc.creatorAgaronian, Andreien
dc.creatorConstantinou, Elenien
dc.creatorZannone, Nicolaen
dc.creatorSerebrenik, Alexanderen
dc.date.accessioned2024-01-18T09:05:46Z
dc.date.available2024-01-18T09:05:46Z
dc.date.issued2023
dc.identifier.isbn9798350311846
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/66028en
dc.description.abstractModern software development practices increasingly rely on third-party libraries due to the inherent benefits of reuse. However, libraries may contain security vulnerabilities that can propagate to the dependent applications. To counter this, maintainers of dependent projects should monitor their dependencies and security reports to ensure that only patched releases of the upstream applications are in use. As manual maintenance of dependencies has shown to be ineffective, several automated tools (aka bots) have been proposed to assist developers in rapidly identifying and resolving vulnerable dependencies. In this work, we focus on Dependabot, a popular bot providing security and version updates, and study developers’ receptivity to its security updates in engineered and actively maintained JavaScript projects. Moreover, we carry out a fine-grained analysis of the lifecycle of every vulnerability to manifest how they are dealt with in the presence of Dependabot. Our findings show that the task of fixing vulnerable dependencies is, to a large extent, delegated to Dependabot and that developers merge the majority of security updates within several days. On the other hand, when developers do not merge a security update, they usually address the identified vulnerability manually. This approach, however, often takes up to several months which in turn could expose the projects to security issues.en
dc.language.isoengen
dc.publisherIEEEen
dc.source2023 IEEE/ACM 20th International Conference on Mining Software Repositories MSR 2023: Melbourne, Australia, 15-16 May 2023 : proceedingsen
dc.source.urihttps://ieeexplore.ieee.org/document/10174082en
dc.subjectBoten
dc.subjectDependaboten
dc.subjectDependency managementen
dc.subjectSecurityen
dc.titleInvestigating the resolution of vulnerable dependencies with dependabot security updatesen
dc.typeinfo:eu-repo/semantics/conferenceObjecten
dc.identifier.doi10.1109/MSR59073.2023.00042en
dc.description.startingpage234
dc.description.endingpage246
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeConference Objecten
dc.contributor.orcidConstantinou, Eleni [0000-0002-4242-2581]
dc.contributor.orcidZannone, Nicola [0000-0002-9081-5996]
dc.type.subtypeCONFERENCE_PROCEEDINGSen
dc.gnosis.orcid0000-0002-4242-2581
dc.gnosis.orcid0000-0002-9081-5996


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record