Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension 2022
DOI: 10.1145/3524610.3527893
|View full text |Cite
|
Sign up to set email alerts
|

Automated identification of libraries from vulnerability data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 35 publications
0
14
0
Order By: Relevance
“…While XML techniques were shown to be effective in the experiments of prior studies [6], [10], we observe that there are practical concerns that need to be addressed. Every year, new libraries are included in the NVD.…”
Section: Introductionmentioning
confidence: 82%
See 4 more Smart Citations
“…While XML techniques were shown to be effective in the experiments of prior studies [6], [10], we observe that there are practical concerns that need to be addressed. Every year, new libraries are included in the NVD.…”
Section: Introductionmentioning
confidence: 82%
“…We performed an empirical study of the number of new libraries with vulnerabilities each year. Our analysis indicates that up to 70% libraries associated up to 50.7% of vulnerability reports each year cannot be correctly identified by the previously proposed approaches [6], [10]. As the training dataset would not contain any NVD entries related to the libraries, the XML techniques would not correctly identify vulnerabilities related to these libraries.…”
Section: Introductionmentioning
confidence: 85%
See 3 more Smart Citations