A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

Vulexplainer: A transformer-based hierarchical distillation for explaining vulnerability types

M Fu, V Nguyen, CK Tantithamthavorn… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Deep learning-based vulnerability prediction approaches are proposed to help under-
resourced security practitioners to detect vulnerable functions. However, security …

AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities

M Fu, C Tantithamthavorn, T Le, Y Kume… - Empirical Software …, 2024 - Springer
Abstract Many Machine Learning (ML)-based approaches have been proposed to
automatically detect, localize, and repair software vulnerabilities. While ML-based methods …

V2w-bert: A framework for effective hierarchical multiclass classification of software vulnerabilities

SS Das, E Serra, M Halappanavar… - 2021 IEEE 8th …, 2021 - ieeexplore.ieee.org
We consider the problem of automating the mapping of observed vulnerabilities in software
listed in Common Vulnerabilities and Exposures (CVE) reports to weaknesses listed in …

Automatic classification method for software vulnerability based on deep neural network

G Huang, Y Li, Q Wang, J Ren, Y Cheng, X Zhao - IEEE Access, 2019 - ieeexplore.ieee.org
Software vulnerabilities are the root causes of various security risks. Once a vulnerability is
exploited by malicious attacks, it will greatly compromise the safety of the system, and may …

Automation of vulnerability classification from its description using machine learning

M Aota, H Kanehara, M Kubo, N Murata… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Vulnerability reports play an important role in cybersecurity. Mitigation of software
vulnerabilities that can be exploited by attackers depends on disclosure of vulnerabilities …

Fine-grained commit-level vulnerability type prediction by CWE tree structure

S Pan, L Bao, X Xia, D Lo, S Li - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Identifying security patches via code commits to allow early warnings and timely fixes for
Open Source Software (OSS) has received increasing attention. However, the existing …

A multi-target approach to estimate software vulnerability characteristics and severity scores

G Spanos, L Angelis - Journal of Systems and Software, 2018 - Elsevier
Software vulnerabilities constitute a great risk for the IT community. The specification of the
vulnerability characteristics is a crucial procedure, since the characteristics are used as input …

[HTML][HTML] A selective ensemble model for cognitive cybersecurity analysis

Y Jiang, Y Atif - Journal of Network and Computer Applications, 2021 - Elsevier
Dynamic data-driven vulnerability assessments face massive heterogeneous data contained
in, and produced by SOCs (Security Operations Centres). Manual vulnerability assessment …

An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network

Q Wang, Y Gao, J Ren, B Zhang - Computers & Security, 2023 - Elsevier
To address the problem that the traditional vectored representation of software vulnerability
data has high-dimensional sparsity and leads to unsatisfactory automatic classification, this …