NDSS 2025 – Enhancing Security In Third-Party Library Reuse
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容。 文章主要讲的是软件安全中的第三方库复用问题。作者们提出了一个工具VULTURE,用于检测1-day漏洞。他们通过分析代码补丁,创建数据库,并使用哈希比较和语义分析来识别漏洞。实验结果显示,在10个项目中检测到了175个漏洞。 接下来,我需要提取关键信息:第三方库复用、1-day漏洞、VULTURE工具、检测方法和实验结果。然后把这些信息浓缩成一句话,确保不超过100字。 可能会遇到的问题是如何简洁地表达技术细节而不遗漏重要点。比如,VULTURE的数据库创建方法和分析技术需要简明扼要地描述。 最后,整合这些要点,形成一个流畅的总结句。 </think> 文章介绍了一种名为VULTURE的工具,用于检测软件开发中因复用第三方库而引入的1-day漏洞。该工具通过代码补丁分析和依赖关系识别,帮助开发者及时发现并修复潜在安全风险。实验表明,在10个实际项目中成功识别了175个漏洞。 2026-2-27 16:0:0 Author: securityboulevard.com(查看原文) 阅读量:0 收藏

Session 14A: Software Security: Applications & Policies

Authors, Creators & Presenters: Shangzhi Xu (The University of New South Wales), Jialiang Dong (The University of New South Wales), Weiting Cai (Delft University of Technology), Juanru Li (Feiyu Tech), Arash Shaghaghi (The University of New South Wales), Nan Sun (The University of New South Wales), Siqi Ma (The University of New South Wales)
PAPER
Enhancing Security in Third-Party Library Reuse – Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis
Nowadays, software development progresses rapidly to incorporate new features. To facilitate such growth and provide convenience for developers when creating and updating software, reusing open-source software (i.e., thirdparty library reuses) has become one of the most effective and efficient methods. Unfortunately, the practice of reusing third-party libraries (TPLs) can also introduce vulnerabilities (known as 1-day vulnerabilities) because of the low maintenance of TPLs, resulting in many vulnerable versions remaining in use. If the software incorporating these TPLs fails to detect the introduced vulnerabilities and leads to delayed updates, it will exacerbate the security risks. However, the complicated code dependencies and flexibility of TPL reuses make the detection of 1-day vulnerability a challenging task. To support developers in securely reusing TPLs during software development, we design and implement VULTURE, an effective and efficient detection tool, aiming at identifying 1-day vulnerabilities that arise from the reuse of vulnerable TPLs. It first executes a database creation method, TPLFILTER, which leverages the Large Language Model (LLM) to automatically build a unique database for the targeted platform. Instead of relying on code-level similarity comparison, VULTURE employs hashing-based comparison to explore the dependencies among the collected TPLs and identify the similarities between the TPLs and the target projects. Recognizing that developers have the flexibility to reuse TPLs exactly or in a custom manner, VULTURE separately conducts version-based comparison and chunk-based analysis to capture fine-grained semantic features at the function levels. We applied VULTURE to 10 real-world projects to assess its effectiveness and efficiency in detecting 1-day vulnerabilities. VULTURE successfully identified 175 vulnerabilities from 178 reused TPLs.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations’ YouTube Channel.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/MptkJKEQOdE?si=OYgMeEODSE8whqRO


文章来源: https://securityboulevard.com/2026/02/ndss-2025-enhancing-security-in-third-party-library-reuse/
如有侵权请联系:admin#unsafe.sh