Vulnerable code detection using software metrics and machine learning

N Medeiros, N Ivaki, P Costa, M Vieira - IEEE Access, 2020 - ieeexplore.ieee.org
Software metrics are widely-used indicators of software quality and several studies have
shown that such metrics can be used to estimate the presence of vulnerabilities in the code …

A hierarchical model for quantifying software security based on static analysis alerts and software metrics

M Siavvas, D Kehagias, D Tzovaras, E Gelenbe - Software Quality Journal, 2021 - Springer
Despite the acknowledged importance of quantitative security assessment in secure
software development, current literature still lacks an efficient model for measuring internal …

Trustworthiness models to categorize and prioritize code for security improvement

N Medeiros, N Ivaki, P Costa, M Vieira - Journal of Systems and Software, 2023 - Elsevier
The exploitation of software security vulnerabilities can have severe consequences. Thus, it
is crucial to devise new processes, techniques, and tools to support teams in the …

Improving real-world vulnerability characterization with vulnerable slices

S Salimi, M Ebrahimzadeh, M Kharrazi - Proceedings of the 16th ACM …, 2020 - dl.acm.org
Vulnerability detection is an important challenge in the security community. Many different
techniques have been proposed, ranging from symbolic execution to fuzzing in order to help …

An approach to characterize the security of open-source functions using lsp

JDA Pereira, M Vieira - 2023 IEEE 34th International …, 2023 - ieeexplore.ieee.org
The malicious exploitation of security flaws by attackers can lead to a range of problems.
While several techniques and tools allow detecting vulnerabilities during the Software …

Improved Allocation and reallocation approaches for software trustworthiness based on mathematical programming

H Tao, L Fu, Y Chen, L Han, X Wang - Symmetry, 2022 - mdpi.com
Software trustworthiness allocation and reallocation are the symmetry of software
trustworthiness measure. They can provide the optimization scheme for trustworthiness …

SDK4ED: a platform for building energy efficient, dependable, and maintainable embedded software

M Siavvas, D Tsoukalas, C Marantos… - Automated Software …, 2024 - Springer
Developing embedded software applications is a challenging task, chiefly due to the
limitations that are imposed by the hardware devices or platforms on which they operate, as …

Effect of coding styles in detection of web application vulnerabilities

I Medeiros, N Neves - 2020 16th European Dependable …, 2020 - ieeexplore.ieee.org
Web application security has become paramount for the organisation's operation, and
therefore, static analysis tools (SAT) for vulnerability detection have been widely researched …

An Empirical Study On Software Metrics and Machine Learning to Identify Untrustworthy Code

N Medeiros, N Ivaki, P Costa… - 2021 17th European …, 2021 - ieeexplore.ieee.org
The increasingly intensive use of software systems in diverse sectors, especially in
business, government, healthcare, and critical infrastructures, makes it essential to deliver …

Trustworthiness assessment of web applications: Approach and experimental study using input validation coding practices

CI Lemes, V Naessens, M Vieira - 2019 IEEE 30th International …, 2019 - ieeexplore.ieee.org
The popularity of web applications and their world-wide use to support business critical
operations raised the interest of hackers on exploiting security vulnerabilities to perform …