2022
DOI: 10.33411/ijist/2022040219
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Code Vulnerabilities in Repositories of GitHub and Rosettacode: A comparative Study

Abstract: Open-source code hosted online at programming portals is present in 99% of commercial software and is common practice among developers for rapid prototyping and cost-effective development. However, research reports the presence of vulnerabilities, which result in catastrophic security compromise, and the individual, organization, and even national secrecy are all victims of this circumstance. One of the frustrating aspects of vulnerabilities is that vulnerabilities manifest themselves in hidden ways that softw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 23 publications
(22 reference statements)
0
2
0
Order By: Relevance
“…Based on the research gap and requirements, we have worked on generating a new feasible dataset that fulfills the requirement of a researcher who wants to test their IDS on a realistic dataset. The generated dataset is publicly available for users on GitHub [50] [51]. Moreover, we have provided complete detailed methods which help analysts to generate their new dataset based on their needs and objectives.…”
Section: 𝑇𝑃 𝑇𝑃 + 𝐹𝑃mentioning
confidence: 99%
“…Based on the research gap and requirements, we have worked on generating a new feasible dataset that fulfills the requirement of a researcher who wants to test their IDS on a realistic dataset. The generated dataset is publicly available for users on GitHub [50] [51]. Moreover, we have provided complete detailed methods which help analysts to generate their new dataset based on their needs and objectives.…”
Section: 𝑇𝑃 𝑇𝑃 + 𝐹𝑃mentioning
confidence: 99%
“…The collaborative R&D takes the software development process as the core collaborates and integrates elements related to the R&D process, such as projects, tasks, methods, standards, tools, and data resources, providing a multi-stage, interdisciplinary and cross-departmental information collaboration environment for the R&D department, supporting the efficient and smooth development of R&D activities, shortening the R&D cycle, and ensuring R&D quality. However, the collaborative research and development mode faces security risks such as identity impersonation, illegal access, unauthorized access, and information leakage, directly threatening the security of business systems and code repositories [1]. The traditional security solution is to set up an isolated authentication area on the boundary of the enterprise for authentication and access control, divide the network with internal and external network interconnection requirements into the internal network and external network, and identify the intranet as a trusted domain.…”
Section: Introductionmentioning
confidence: 99%