2021
DOI: 10.3390/s21041133
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Feature Selection for Static Analysis Vulnerability Prediction

Abstract: Common software vulnerabilities can result in severe security breaches, financial losses, and reputation deterioration and require research effort to improve software security. The acceleration of the software production cycle, limited testing resources, and the lack of security expertise among programmers require the identification of efficient software vulnerability predictors to highlight the system components on which testing should be focused. Although static code analyzers are often used to improve softw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 43 publications
(70 reference statements)
0
4
0
Order By: Relevance
“…The field that started with the need to encrypt data and create secure systems through strong means for security such as passwords, authentication schemes, firewalls and cryptographic keys, has now substantially evolved towards the detection and mitigation of cyberattacks. In addition issues with respect to software's own specific vulnerabilities [23] and the need to detect and mitigate such properties has also become important [23,24,44,88,109,110].…”
Section: Discussionmentioning
confidence: 99%
“…The field that started with the need to encrypt data and create secure systems through strong means for security such as passwords, authentication schemes, firewalls and cryptographic keys, has now substantially evolved towards the detection and mitigation of cyberattacks. In addition issues with respect to software's own specific vulnerabilities [23] and the need to detect and mitigate such properties has also become important [23,24,44,88,109,110].…”
Section: Discussionmentioning
confidence: 99%
“…But it has now substantially been revolutionized as a means to detect and mitigate cyberattacks. Software's own specific vulnerabilities [187] have also become critical [176], [188]- [192]. Indeed, static means of Cybersecurity assurance are largely ineffective unless they incorportd real-time methods that can detect and rapidly react to attacks and malicious actions against a system.…”
Section: The Iotac Projectmentioning
confidence: 99%
“…Apart from alert-specific information, we decided to integrate security-related information retrieved from the software project itself. In particular, we applied text mining-based deep learning vulnerability prediction models [25][26][27] (see Section 4), in order to spot the security hot-spots of the software products, i.e., software classes that are likely to contain vulnerabilities. By highlighting the security hot-spots, we expect our approach to consider as more critical those static analysis alerts that belong to the identified hot-spots.…”
Section: Data Collection and Pre-processingmentioning
confidence: 99%