Data preparation for software vulnerability prediction: A systematic literature review

R Croft, Y Xie, MA Babar - IEEE Transactions on Software …, 2022 - ieeexplore.ieee.org
Software Vulnerability Prediction (SVP) is a data-driven technique for software quality
assurance that has recently gained considerable attention in the Software Engineering …

NLP methods in host-based intrusion detection Systems: A systematic review and future directions

ZT Sworna, Z Mousavi, MA Babar - Journal of Network and Computer …, 2023 - Elsevier
Abstract Host-based Intrusion Detection System (HIDS) is an effective last line of defense for
defending against cyber security attacks after perimeter defenses (eg, Network-based …

Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery

J Yin, MJ Tang, J Cao, M You, H Wang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Coexploitation behavior, referring to multiple software vulnerabilities being exploited jointly
by one or more exploits, brings enormous challenges to the prevention and remediation of …

Sok: Explainable machine learning for computer security applications

A Nadeem, D Vos, C Cao, L Pajola… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …

Deepcva: Automated commit-level vulnerability assessment with deep multi-task learning

THM Le, D Hin, R Croft… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give
early warnings about potential security risks. However, there is a lack of effort to assess …

Fine-grained commit-level vulnerability type prediction by CWE tree structure

S Pan, L Bao, X Xia, D Lo, S Li - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Identifying security patches via code commits to allow early warnings and timely fixes for
Open Source Software (OSS) has received increasing attention. However, the existing …

Common vulnerability scoring system prediction based on open source intelligence information sources

P Kuehn, DN Relke, C Reuter - Computers & Security, 2023 - Elsevier
The number of newly published vulnerabilities is constantly increasing. Until now, the
information available when a new vulnerability is published is manually assessed by experts …

A Survey on Software Vulnerability Exploitability Assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

On the use of fine-grained vulnerable code statements for software vulnerability assessment models

THM Le, MA Babar - Proceedings of the 19th International Conference …, 2022 - dl.acm.org
Many studies have developed Machine Learning (ML) approaches to detect Software
Vulnerabilities (SVs) in functions and fine-grained code statements that cause such SVs …

Automatic software vulnerability assessment by extracting vulnerability elements

X Sun, Z Ye, L Bo, X Wu, Y Wei, T Zhang, B Li - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities take threats to software security. When faced with multiple software
vulnerabilities, the most urgent ones need to be fixed first. Therefore, it is critical to assess …