2015
DOI: 10.1002/cpe.3532
|View full text |Cite
|
Sign up to set email alerts
|

CLORIFI: software vulnerability discovery using code clone verification

Abstract: Summary Software vulnerability has long been considered an important threat to the system safety. A vulnerability is often reproduced because of the frequent code reuse by programmers. Security patches are usually not propagated to all code clones; however, they could be leveraged to discover unknown vulnerabilities. Static code auditing approaches are frequently proposed to scan source codes for security flaws; unfortunately, these approaches generate too many false positives. While dynamic execution analysis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…CLORIFI [8] is the closest research to this paper. It proposes a method to detect code clone vulnerabilities by the combination of static and dynamic analysis.…”
Section: Related Workmentioning
confidence: 97%
“…CLORIFI [8] is the closest research to this paper. It proposes a method to detect code clone vulnerabilities by the combination of static and dynamic analysis.…”
Section: Related Workmentioning
confidence: 97%
“…Li developed a software vulnerability detection mechanism named CLORIFI . It combines the advantage of static and dynamic analysis to detect code clone vulnerability using code clone verification [32]. That reduces false positives, but CVE patch information is not enough to identify sensitive sinks.…”
Section: B Mature Toolsmentioning
confidence: 99%
“…They define a novel distance measurement that combines the semantic and Euclidean distance to address the privacy-preserving issue. They conduct performance experiments on the proposed algorithm and distance metric, and results suggest that they can successfully retain the utility of the location services.In [3], to discover software vulnerability, an effective and efficient mechanism is proposed. The method also helps programmers to write secure code to avoid the existence of vulnerability at the early stage of software development.…”
mentioning
confidence: 99%
“…In , to discover software vulnerability, an effective and efficient mechanism is proposed. The method also helps programmers to write secure code to avoid the existence of vulnerability at the early stage of software development.…”
mentioning
confidence: 99%