[HTML][HTML] A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies

K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …

[HTML][HTML] A Survey of Bug Bounty Programs in Strengthening Cybersecurity and Privacy in the Blockchain Industry

J Arshad, M Talha, B Saleem, Z Shah, H Zaman… - Blockchains, 2024 - mdpi.com
The increasing reliance on computer networks and blockchain technology has led to a
growing concern for cybersecurity and privacy. The emergence of zero-day vulnerabilities …

Generative AI and Large Language Models for Cyber Security: All Insights You Need

MA Ferrag, F Alwahedi, A Battah, B Cherif… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper provides a comprehensive review of the future of cybersecurity through
Generative AI and Large Language Models (LLMs). We explore LLM applications across …

A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement

L Kong, S Luo, L Pan, Z Wu, X Li - Computers & Security, 2024 - Elsevier
A core problem of vulnerability detection is to detect multi-type vulnerabilities simultaneously
by characterizing vulnerabilities of high diversity and complexity in real program source …

[HTML][HTML] Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI

J Haurogné, N Basheer, S Islam - Machine Learning with Applications, 2024 - Elsevier
Vulnerabilities in the source code are one of the main causes of potential threats in software-
intensive systems. There are a large number of vulnerabilities published each day, and …

Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++

AT Nguyen, THM Le, MA Babar - Proceedings of the 18th ACM/IEEE …, 2024 - dl.acm.org
Background: The C/C++ languages hold significant importance in Software Engineering
research because of their widespread use in practice. Numerous studies have utilized …

CSVD-TF: Cross-project software vulnerability detection with TrAdaBoost by fusing expert metrics and semantic metrics

Z Cai, Y Cai, X Chen, G Lu, W Pei, J Zhao - Journal of Systems and …, 2024 - Elsevier
Recently, deep learning-based software vulnerability detection (SVD) approaches have
achieved promising performance. However, the scarcity of high-quality labeled SVD data …

MVD: A Multi-Lingual Software Vulnerability Detection Framework

B Zhang, THM Le, MA Babar - arXiv preprint arXiv:2412.06166, 2024 - arxiv.org
Software vulnerabilities can result in catastrophic cyberattacks that increasingly threaten
business operations. Consequently, ensuring the safety of software systems has become a …

Similarity-Based Source Code Vulnerability Detection Leveraging Transformer Architecture: Harnessing Cross-Attention for Hierarchical Analysis

S Han, M Kim, J Kang, K Kim, S Lee, S Lee - IEEE Access, 2024 - ieeexplore.ieee.org
The growing complexity and volume of modern software have led to an increase in source
code vulnerabilities, posing significant security risks. In response, deep learning-based …

Code Linting using Language Models

D Holden, N Kahani - arXiv preprint arXiv:2406.19508, 2024 - arxiv.org
Code linters play a crucial role in developing high-quality software systems by detecting
potential problems (eg, memory leaks) in the source code of systems. Despite their benefits …