2023
DOI: 10.1007/s10664-023-10346-3
|View full text |Cite
|
Sign up to set email alerts
|

AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities

Michael Fu,
Chakkrit Tantithamthavorn,
Trung Le
et al.

Abstract: Many Machine Learning(ML)-based approaches have been proposed to automatically detect, localize, and repair software vulnerabilities. While ML-based methods are more effective than program analysis-based vulnerability analysis tools, few have been integrated into modern Integrated Development Environments (IDEs), hindering practical adoption. To bridge this critical gap, we propose in this article AIBugHunter, a novel Machine Learning-based software vulnerability analysis tool for C/C++ languages that is integ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…This approach aims to bridge the gap between industry and academia, enhancing the development and effectiveness of Ethical Hacking tools. [56], DFBC [69], ESASCF [73], ESRFuzzer [74], Firmaster [76], IoTFuzzer [83], LTESniffer [88], Lore [87], MaliceScript [92], Owfuzz [108], Pyciuti [118], RT-RCT [124], SVED [133], Scanner++ [125], ShoVAT [128], SuperEye [132], TOR-PEDO [136], UE Security Reloaded [137], Vulcan [142], Vulnsloit [146] Threat Modelling Cairis [60], ESSecA [75], HARMer [81], MAL [91], PenQuest [112], TAMELESS [134] Vulnerability Analysis AIBugHunter [52], ARMONY [53], AVAIN [55], Autosploit [54], Bbuzz [56], Black…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach aims to bridge the gap between industry and academia, enhancing the development and effectiveness of Ethical Hacking tools. [56], DFBC [69], ESASCF [73], ESRFuzzer [74], Firmaster [76], IoTFuzzer [83], LTESniffer [88], Lore [87], MaliceScript [92], Owfuzz [108], Pyciuti [118], RT-RCT [124], SVED [133], Scanner++ [125], ShoVAT [128], SuperEye [132], TOR-PEDO [136], UE Security Reloaded [137], Vulcan [142], Vulnsloit [146] Threat Modelling Cairis [60], ESSecA [75], HARMer [81], MAL [91], PenQuest [112], TAMELESS [134] Vulnerability Analysis AIBugHunter [52], ARMONY [53], AVAIN [55], Autosploit [54], Bbuzz [56], Black…”
Section: Discussionmentioning
confidence: 99%
“…AIBugHunter [52], ARMONY [53], AVAIN [55], AVAIN [55], Autosploit [54], Bbuzz [56], Black Ostrich [57], Black Widow [58], Bleem [59], Cairis [60], Censys [61], Chainsaw [62], Chucky [63], Commix [64], CryptoGuard [65], CuPerFuzzer [66], DFBC [69], Deemon [67], Delta [68], Delta [68], Diane [70], EBF [71], ELAID [72], ESASCF [73], ESRFuzzer [74], ESSecA [75], FUGIO [77], FUSE [78], Firmaster [76], Gail-PT [79], Gail-PT [79], HILTI [82], HILTI [82], IoTFuzzer [83], JCOMIX [84], LAID [85], LTESniffer [88], Link [86], Lore [87], Mace [89], MaliceScript [92], MaliceScript [92], Masat [93], Mirage [94], Mirage [94], Mitch [95], MoScan …”
Section: Reconnaissancementioning
confidence: 99%
“…The purpose of the study was to examine VulRepair and improve the model. We gained a perspective by reviewing AIBughunter at [1], LineVul at [4], and VulRepair at [7]. In the VulRepair project, there are threats to their internal validity.…”
Section: Methodsmentioning
confidence: 99%
“…We specifically examined and reviewed the work of Mike Fu, as referenced earlier [1,4]. To find additional research related to VulRepair, we conducted searches on the Internet and Google Scholar, yielding over 100 articles.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation