Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security risks to many software systems. Given the limited resources in practice, SV assessment and …
Ensuring security for modern IoT systems requires the use of complex methods to analyze their software. One of the most in-demand methods that has repeatedly been proven to be …
Deep learning-based vulnerability prediction approaches are proposed to help under- resourced security practitioners to detect vulnerable functions. However, security …
Abstract Many Machine Learning (ML)-based approaches have been proposed to automatically detect, localize, and repair software vulnerabilities. While ML-based methods …
We consider the problem of automating the mapping of observed vulnerabilities in software listed in Common Vulnerabilities and Exposures (CVE) reports to weaknesses listed in …
S Pan, L Bao, X Xia, D Lo, S Li - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Identifying security patches via code commits to allow early warnings and timely fixes for Open Source Software (OSS) has received increasing attention. However, the existing …
Security vulnerabilities are increasingly prevalent in modern software and they are widely consequential to our society. Various approaches to defending against these vulnerabilities …
Y Wei, L Bo, X Sun, B Li, T Zhang, C Tao - Information and Software …, 2023 - Elsevier
Context: The dramatically increasing number of vulnerabilities makes manual vulnerability analysis increasingly more difficult. Automatic extraction of vulnerability information can help …
L Yuan, Y Bai, Z Xing, S Chen, X Li… - 2021 IEEE 45th Annual …, 2021 - ieeexplore.ieee.org
Security databases such as Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), and Common Attack Pattern Enumeration and Classification …