Application security programs, as part of a Security Development Life Cycle (SDLC) often need to prove that they actually pay off. Also, it is not always clear what are the most economical way of fixing a security vulnerability - in particular if the vulnerability is, as part of a secure software supply-chain a consumed third-party component.
To provide more insights into these topics we are, in collaboration with industry partners, working on empirical studies supporting our (software) security research areas. In particular, we are looking into
Effort models for fixing publicly revealed security vulnerabilities in consumed third part components and
Identifying factors that influence the time required for fixing security issues.