2023
DOI: 10.1007/s10664-023-10415-7
|View full text |Cite
|
Sign up to set email alerts
|

APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities

Quang-Cuong Bui,
Ranindya Paramitha,
Duc-Ly Vu
et al.

Abstract: Security vulnerability fixes could be a promising research avenue for Automated Program Repair (APR) techniques. In recent years, APR tools have been thoroughly developed for fixing generic bugs. However, the area is still relatively unexplored when it comes to fixing security bugs or vulnerabilities. In this paper, we evaluate nine state-of-the-art APR tools and one vulnerability-specific repair tool. In particular, we investigate their ability to generate patches for 79 real-world Java vulnerabilities in the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 81 publications
(82 reference statements)
0
0
0
Order By: Relevance
“…Their vulnerability dataset is from CVE [19], Smart Contract Weakness Classification (SWC) [20], and Smart Bugs curated as a ground truth from evaluations. The empirical study [5] has shown the ability of APR tools to generate the trustworthiness of patches for Java security vulnerabilities. The study [3] employs the abstract syntax tree (AST) path technique for representation, enabling the capture of structural information from AST nodes.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Their vulnerability dataset is from CVE [19], Smart Contract Weakness Classification (SWC) [20], and Smart Bugs curated as a ground truth from evaluations. The empirical study [5] has shown the ability of APR tools to generate the trustworthiness of patches for Java security vulnerabilities. The study [3] employs the abstract syntax tree (AST) path technique for representation, enabling the capture of structural information from AST nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The process aims to reduce the manual effort required in debugging and can be particularly useful in large codebases. Our dataset can be utilized in a similar manner as implemented by the existing studies in automated patch generation [31,32], security vulnerability repairing [33,34], and program repair [5,35]. In addition, in the field of research in software engineering, techniques and tools are developed to fix software vulnerabilities automatically.…”
Section: Applications Of Fixmementioning
confidence: 99%
See 1 more Smart Citation