Articles with "vulnerability detection" as a keyword



Photo by thisisengineering from unsplash

Ontology-based services for software vulnerability detection: a survey

Sign Up to like & get
recommendations!
Published in 2019 at "Service Oriented Computing and Applications"

DOI: 10.1007/s11761-019-00276-8

Abstract: Ontologies, as formal specifications of conceptualisation, are widely used in software engineering to manage software development, maintenance and security concerns. Recently, some ontology services were proposed for software vulnerability detection and showed to be effective.… read more here.

Keywords: vulnerability detection; ontology; software vulnerability; software ... See more keywords
Photo by ricbro from unsplash

A Python Security Analysis Framework in Integrity Verification and Vulnerability Detection

Sign Up to like & get
recommendations!
Published in 2019 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-019-1379-5

Abstract: Python is widely used in web crawler, machine learning, data analysis and so on. However, there is no guarantee that Python scripts are trusted in their whole lifetime because of system insecurity. When the system… read more here.

Keywords: integrity; vulnerability detection; integrity verification;
Photo by thisisengineering from unsplash

A Method for Software Vulnerability Detection Based on Improved Control Flow Graph

Sign Up to like & get
recommendations!
Published in 2019 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-019-1380-z

Abstract: With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great significance in reducing system crashes… read more here.

Keywords: detection; software vulnerability; method; vulnerability ... See more keywords
Photo by cytonn_photography from unsplash

CodeNet: Code-Targeted Convolutional Neural Network Architecture for Smart Contract Vulnerability Detection

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3162065

Abstract: A smart contract is a computer program which is automatically executed with some conditional statements such as “if/then”. Since smart contracts can include some vulnerable program codes, smart contract exploit was recently highlighted as one… read more here.

Keywords: smart contract; codenet; vulnerability detection; detection ... See more keywords
Photo by thisisengineering from unsplash

Developer’s Roadmap to Design Software Vulnerability Detection Model Using Different AI Approaches

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3191115

Abstract: Automatic software vulnerability detection has caught the eyes of researchers as because software vulnerabilities are exploited vehemently causing major cyber-attacks. Thus, designing a vulnerability detector is an inevitable approach to eliminate vulnerabilities. With the advances… read more here.

Keywords: vulnerability; software vulnerability; vulnerability detection; model ... See more keywords
Photo by thisisengineering from unsplash

Software Vulnerability Detection Using Deep Neural Networks: A Survey

Sign Up to like & get
recommendations!
Published in 2020 at "Proceedings of the IEEE"

DOI: 10.1109/jproc.2020.2993293

Abstract: The constantly increasing number of disclosed security vulnerabilities have become an important concern in the software industry and in the field of cybersecurity, suggesting that the current approaches for vulnerability detection demand further improvement. The… read more here.

Keywords: vulnerability; vulnerability detection; software; code ... See more keywords
Photo by michael75 from unsplash

Vulnerability Detection of ICS Protocols via Cross-State Fuzzing

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2022.3201471

Abstract: Industrial control system (ICS) employs complex multistate protocols to realize high-reliability communication and intelligent control over automation equipment. ICS has been widely used in various embedded fields, such as autonomous vehicle systems, power automation systems,… read more here.

Keywords: state; ics protocols; vulnerability detection; cross state ... See more keywords
Photo by alexbemore from unsplash

Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Network Science and Engineering"

DOI: 10.1109/tnse.2020.3038142

Abstract: SIoT enables devices to communicate with each other automatically, which is not reliable when SIoT applications are vulnerable themselves. To improve the security of SIoT, different techniques have been employed so far, mainly to detect… read more here.

Keywords: vulnerability detection; siot applications; siot; path coverage ... See more keywords
Photo by drew_hays from unsplash

Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Software Engineering"

DOI: 10.1109/tse.2022.3207149

Abstract: Open science is a practice that makes scientific research publicly accessible to anyone, hence is highly beneficial. Given the benefits, the software engineering (SE) community has been diligently advocating open science policies during peer reviews… read more here.

Keywords: science; vulnerability detection; open science; software ... See more keywords
Photo from wikipedia

Automated Software Vulnerability Detection Based on Hybrid Neural Network

Sign Up to like & get
recommendations!
Published in 2021 at "Applied Sciences"

DOI: 10.3390/app11073201

Abstract: Vulnerabilities threaten the security of information systems. It is crucial to detect and patch vulnerabilities before attacks happen. However, existing vulnerability detection methods suffer from long-term dependency, out of vocabulary, bias towards global features or… read more here.

Keywords: neural network; hybrid neural; vulnerability detection; vulnerability ... See more keywords
Photo by arthurbizkit from unsplash

Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14110326

Abstract: With the blooming of blockchain-based smart contracts in decentralized applications, the security problem of smart contracts has become a critical issue, as vulnerable contracts have resulted in severe financial losses. Existing research works have explored… read more here.

Keywords: network; ethereum smart; vulnerability detection; smart contracts ... See more keywords