Static analysis tool discrepancies and the pursuit of a unified vulnerability database

dc.contributor.advisorChairperson, Graduate Committee: Ann Marie Reinholden
dc.contributor.authorBoles, Brittany Morganen
dc.contributor.otherThis is a manuscript style paper that includes co-authored chapters.en
dc.date.accessioned2025-09-05T12:01:31Z
dc.date.available2025-09-05T12:01:31Z
dc.date.issued2025en
dc.description.abstractWhen cyber attacks succeed, they affect communities, not just systems. To protect against these threats, organizations use static analysis tools to identify vulnerabilities in software components, especially within third-party dependencies. The effectiveness of these tools depends on their reliance on external vulnerability databases. The specific databases that researchers use and the way they aggregate data significantly influence the vulnerabilities they identify and report. In this thesis, I investigate inconsistent vulnerability counts reported by two widely used static analysis tools, Trivy and Grype, across 927 Docker images. Trivy and Grype rely on different vulnerability databases. I show that differences in database selection and aggregation techniques lead to divergent vulnerability counts, classifications, and severity metrics. My findings emphasize the need for better interoperability and aggregation strategies in vulnerability management. In response, I developed an integrated graph-based vulnerability database that integrates data from the National Vulnerability Database (NVD), GitHub Advisories, and the Open Source Vulnerability (OSV) database. By incorporating relationships such as aliases and related vulnerabilities, our graph database enables seamless cross-referencing, even across differing vulnerability identifiers. Further, our graph database includes EPSS scores and CWE mappings, offering additional security perspectives. This approach improves both coverage and collaboration, supporting informed security decisions. Our analysis of the 2023 top ten most routinely exploited vulnerabilities demonstrates the graph database's practical value: while all ten were present in the NVD, OSV included only one, and GitHub Advisories required alias relationships for identification. Moreover, nine of the ten vulnerabilities shared linked Common Weakness Enumeration (CWE) entries, revealing exploitable patterns in vulnerability structures. This thesis advances the field by exposing inconsistencies in existing vulnerability tools that rely on disparate databases, and by introducing a scalable, unified system to enable more informed security decision-making.en
dc.identifier.urihttps://scholarworks.montana.edu/handle/1/19284en
dc.language.isoenen
dc.publisherMontana State University - Bozeman, College of Engineeringen
dc.rights.holderCopyright 2025 by Brittany Morgan Bolesen
dc.subject.lcshComputer securityen
dc.subject.lcshSoftware protectionen
dc.subject.lcshRisk assessmenten
dc.subject.lcshGraph databasesen
dc.titleStatic analysis tool discrepancies and the pursuit of a unified vulnerability databaseen
dc.typeThesisen
mus.data.thumbpage46en
thesis.degree.committeemembersMembers, Graduate Committee: Clemente Izurieta; Matthew Revelleen
thesis.degree.departmentComputingen
thesis.degree.genreThesisen
thesis.degree.nameMSen
thesis.format.extentfirstpage1en
thesis.format.extentlastpage59en

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
boles-static-analysis-2025.pdf
Size:
620.24 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
825 B
Format:
Item-specific license agreed upon to submission
Description: