Augmenting Software Bills of Materials with Software Vulnerability Description: A Preliminary Study on GitHub
By: Davide Fucci , Massimiliano Di Penta , Simone Romano and more
Potential Business Impact:
Finds software problems before they cause trouble.
Software Bills of Material (SBOMs) are becoming a consolidated, often enforced by governmental regulations, way to describe software composition. However, based on recent studies, SBOMs suffer from limited support for their consumption and lack information beyond simple dependencies, especially regarding software vulnerabilities. This paper reports the results of a preliminary study in which we augmented SBOMs of 40 open-source projects with information about Common Vulnerabilities and Exposures (CVE) exposed by project dependencies. Our augmented SBOMs have been evaluated by submitting pull requests and by asking project owners to answer a survey. Although, in most cases, augmented SBOMs were not directly accepted because owners required a continuous SBOM update, the received feedback shows the usefulness of the suggested SBOM augmentation.
Similar Papers
Policy-driven Software Bill of Materials on GitHub: An Empirical Study
Software Engineering
Finds security problems in computer code.
SBOMproof: Beyond Alleged SBOM Compliance for Supply Chain Security of Container Images
Cryptography and Security
Finds hidden computer program dangers.
A Reality Check on SBOM-based Vulnerability Management: An Empirical Study and A Path Forward
Cryptography and Security
Finds real software problems, not fake ones.