Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Fixing vulnerabilities potentially hinders maintainability
Publication

Publications

Fixing vulnerabilities potentially hinders maintainability

Title
Fixing vulnerabilities potentially hinders maintainability
Type
Article in International Scientific Journal
Year
2021
Authors
Reis, S
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Rui Abreu
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Cruz, L
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Vol. 26
ISSN: 1382-3256
Publisher: Springer Nature
Indexing
Publicação em ISI Web of Knowledge ISI Web of Knowledge - 0 Citations
Publicação em Scopus Scopus - 0 Citations
Other information
Authenticus ID: P-00V-F9M
Abstract (EN): Security is a requirement of utmost importance to produce high-quality software. However, there is still a considerable amount of vulnerabilities being discovered and fixed almost weekly. We hypothesize that developers affect the maintainability of their codebases when patching vulnerabilities. This paper evaluates the impact of patches to improve security on the maintainability of open-source software. Maintainability is measured based on the Better Code Hub's model of 10 guidelines on a dataset, including 1300 security-related commits. Results show evidence of a trade-off between security and maintainability for 41.90% of the cases, i.e., developers may hinder software maintainability. Our analysis shows that 38.29% of patches increased software complexity and 37.87% of patches increased the percentage of LOCs per unit. The implications of our study are that changes to codebases while patching vulnerabilities need to be performed with extra care; tools for patch risk assessment should be integrate into the CI/CD pipeline; computer science curricula needs to be updated; and, more secure programming languages are necessary.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 27
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

To the attention of mobile software developers: guess what, test your app! (2019)
Article in International Scientific Journal
Cruz, L; Rui Abreu; Lo, D
Improving energy-efficiency by recommending Java collections (2021)
Article in International Scientific Journal
Oliveira, W; Oliveira, R; Castor, F; Pinto, G; Joao Paulo Fernandes
GreenHub: a large-scale collaborative dataset to battery consumption analysis of android devices (2021)
Article in International Scientific Journal
Pereira, R; Matalonga, H; Couto, M; Castor, F; Cabral, B; Carvalho, P; de Sousa, SM; Joao Paulo Fernandes
Catalog of energy patterns for mobile applications (2019)
Article in International Scientific Journal
Cruz, L; Rui Abreu
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-10 at 04:33:49 | Privacy Policy | Personal Data Protection Policy | Whistleblowing