Android source code vulnerability detection: a systematic literature review

J Senanayake, H Kalutarage, MO Al-Kadri… - ACM Computing …, 2023 - dl.acm.org
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …

Android mobile malware detection using machine learning: A systematic review

J Senanayake, H Kalutarage, MO Al-Kadri - Electronics, 2021 - mdpi.com
With the increasing use of mobile devices, malware attacks are rising, especially on Android
phones, which account for 72.2% of the total market share. Hackers try to attack …

A survey on machine learning techniques for source code analysis

T Sharma, M Kechagia, S Georgiou, R Tiwari… - arXiv preprint arXiv …, 2021 - arxiv.org
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

Fault-aware neural code rankers

JP Inala, C Wang, M Yang, A Codas… - Advances in …, 2022 - proceedings.neurips.cc
Large language models (LLMs) have demonstrated an impressive ability to generate code
for various programming tasks. In many instances, LLMs can generate a correct program for …

[HTML][HTML] System security assurance: A systematic literature review

A Shukla, B Katt, LO Nweke, PK Yeng… - Computer Science …, 2022 - Elsevier
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …

{“Security} is not my field,{I'm} a stats {guy”}: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry

J Mink, H Kaur, J Schmüser, S Fahl, Y Acar - 32nd USENIX Security …, 2023 - usenix.org
Adversarial machine learning (AML) has the potential to leak training data, force arbitrary
classifications, and greatly degrade overall performance of machine learning models, all of …

Automated software vulnerability detection based on hybrid neural network

X Li, L Wang, Y Xin, Y Yang, Q Tang, Y Chen - Applied Sciences, 2021 - mdpi.com
Feature Application This study can be applied to software vulnerability detection. Abstract
Vulnerabilities threaten the security of information systems. It is crucial to detect and patch …

[HTML][HTML] A survey on machine learning techniques applied to source code

T Sharma, M Kechagia, S Georgiou, R Tiwari… - Journal of Systems and …, 2024 - Elsevier
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

On the use of fine-grained vulnerable code statements for software vulnerability assessment models

THM Le, MA Babar - Proceedings of the 19th International Conference …, 2022 - dl.acm.org
Many studies have developed Machine Learning (ML) approaches to detect Software
Vulnerabilities (SVs) in functions and fine-grained code statements that cause such SVs …

Examining the capacity of text mining and software metrics in vulnerability prediction

I Kalouptsoglou, M Siavvas, D Kehagias… - Entropy, 2022 - mdpi.com
Software security is a very important aspect for software development organizations who
wish to provide high-quality and dependable software to their consumers. A crucial part of …