Contents
In the present web page, the spreadsheets that were used for the evaluation of the proposed model are provided. These data can be used either for reproducing the results presented in the associated paper or for further research. In the latter case, please provide appropriate citation to the original paper.
Raw evaluation results of 150 open-source software applications retrieved from GitHub
Comparison of the Security Indexes (produced by the proposed Security Assessment Model) with the SAVD (calculated using FindBugs)
Discretion Power of the proposed Security Assessment Model (SAM)
Impact of Software Metrics
Discriminative Power of the proposed Security Assessment Mode (SAM)
Security Indexes of Vulnerable Classes
Security Indexes of Clean Classes
Correlation analysis based on the OWASP Benchmark
This dataset was used for the correlation analyses presented in Section 5.4.2 and 5.4.3 of the paper.
CKJM Metrics - Descriptive Statistics for the Benchmark Repository
Comparison of SAM with a CVE-based approach (i.e., the OWASP Dependency Check)
This dataset was used for the analysis that is presented in Section 5.3 of the paper.
The link below contains the actual reports that were produced by the OWASP Dependency Check Tool, which was used for the analysis presented in Section 5.3 of the paper:
Additional Material for the Discretion Power Experiment (Section 5.2)
The detailed results of the Shapiro-Wilk and Mauchly's tests that were applied in Section 5.2 for testing the Normality and Sphericity Assumptions of the rANOVA test are provided in the document below.
The link below contains the sources of the subject applications that were used for the purposes of the initial analysis presented in Section 5.2 of the paper, i.e., the analysis using the OWASP Benchmark applications.
The Security Assessment Model is part of the SDK4ED project, which is partially funded by the Horizon2020 research and innovation program under the grant agreement No 780572.