Data-driven cybersecurity incident prediction: A survey

N Sun, J Zhang, P Rimba, S Gao… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …

Software fault prediction metrics: A systematic literature review

D Radjenović, M Heričko, R Torkar… - Information and software …, 2013 - Elsevier
CONTEXT: Software metrics may be used in fault prediction models to improve software
quality by predicting fault location. OBJECTIVE: This paper aims to identify software metrics …

Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

VUDENC: vulnerability detection with deep learning on a natural codebase for Python

L Wartschinski, Y Noller, T Vogel, T Kehrer… - Information and …, 2022 - Elsevier
Context: Identifying potential vulnerable code is important to improve the security of our
software systems. However, the manual detection of software vulnerabilities requires expert …

Predicting vulnerable software components via text mining

R Scandariato, J Walden, A Hovsepyan… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper presents an approach based on machine learning to predict which components
of a software application contain security vulnerabilities. The approach is based on text …

Vulpecker: an automated vulnerability detection system based on code similarity analysis

Z Li, D Zou, S Xu, H Jin, H Qi, J Hu - … of the 32nd annual conference on …, 2016 - dl.acm.org
Software vulnerabilities are the fundamental cause of many attacks. Even with rapid
vulnerability patching, the problem is more complicated than it looks. One reason is that …

Cross-project transfer representation learning for vulnerable function discovery

G Lin, J Zhang, W Luo, L Pan, Y Xiang… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Machine learning is now widely used to detect security vulnerabilities in the software, even
before the software is released. But its potential is often severely compromised at the early …

Automatic feature learning for predicting vulnerable software components

HK Dam, T Tran, T Pham, SW Ng… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Code flaws or vulnerabilities are prevalent in software systems and can potentially cause a
variety of problems including deadlock, hacking, information loss and system failure. A …

{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs

H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li… - 29th USENIX Security …, 2020 - usenix.org
Grey-box fuzz testing has revealed thousands of vulnerabilities in real-world software owing
to its lightweight instrumentation, fast coverage feedback, and dynamic adjusting strategies …

Learning to predict severity of software vulnerability using only vulnerability description

Z Han, X Li, Z Xing, H Liu, Z Feng - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Software vulnerabilities pose significant security risks to the host computing system. Faced
with continuous disclosure of software vulnerabilities, system administrators must prioritize …