A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

Securebert: A domain-specific language model for cybersecurity

E Aghaei, X Niu, W Shadid, E Al-Shaer - International Conference on …, 2022 - Springer
Abstract Natural Language Processing (NLP) has recently gained wide attention in
cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation …

Vulexplainer: A transformer-based hierarchical distillation for explaining vulnerability types

M Fu, V Nguyen, CK Tantithamthavorn… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Deep learning-based vulnerability prediction approaches are proposed to help under-
resourced security practitioners to detect vulnerable functions. However, security …

Large language model (llm) for telecommunications: A comprehensive survey on principles, key techniques, and opportunities

H Zhou, C Hu, Y Yuan, Y Cui, Y Jin, C Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
Large language models (LLMs) have received considerable attention recently due to their
outstanding comprehension and reasoning capabilities, leading to great progress in many …

AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities

M Fu, C Tantithamthavorn, T Le, Y Kume… - Empirical Software …, 2024 - Springer
Abstract Many Machine Learning (ML)-based approaches have been proposed to
automatically detect, localize, and repair software vulnerabilities. While ML-based methods …

Smet: Semantic mapping of cve to att&ck and its application to cybersecurity

B Abdeen, E Al-Shaer, A Singhal, L Khan… - IFIP Annual Conference …, 2023 - Springer
Cybercriminals relentlessly pursue vulnerabilities across cyberspace to exploit software,
threatening the security of individuals, organizations, and governments. Although security …

A tree-based machine learning methodology to automatically classify software vulnerabilities

G Aivatoglou, M Anastasiadis, G Spanos… - … on Cyber Security …, 2021 - ieeexplore.ieee.org
Software vulnerabilities have become a major problem for the security analysts, since the
number of new vulnerabilities is constantly growing. Thus, there was a need for a …

Toward more effective deep learning-based automated software vulnerability prediction, classification, and repair

M Fu - 2023 IEEE/ACM 45th International Conference on …, 2023 - ieeexplore.ieee.org
Software vulnerabilities are prevalent in software systems and the unresolved vulnerable
code may cause system failures or serious data breaches. To enhance security and prevent …

Vulnerability classification on source code using text mining and deep learning techniques

I Kalouptsoglou, M Siavvas… - 2024 IEEE 24th …, 2024 - ieeexplore.ieee.org
Nowadays, security testing is an integral part of the testing activities during the software
development life-cycle. Over the years, various techniques have been proposed to identify …

Towards an improved understanding of software vulnerability assessment using data-driven approaches

THM Le - arXiv preprint arXiv:2207.11708, 2022 - arxiv.org
The thesis advances the field of software security by providing knowledge and automation
support for software vulnerability assessment using data-driven approaches. Software …