2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM) 2018
DOI: 10.1109/scam.2018.00014
|View full text |Cite
|
Sign up to set email alerts
|

[Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 10 publications
0
19
0
Order By: Relevance
“…We collected all vulnerabilities reported in NVD for the three systems under study using the VulData7 framework [23]. VulData7 automatically retrieves all declared bug reports and patches by crawling NVD.…”
Section: Data Collectionmentioning
confidence: 99%
See 1 more Smart Citation
“…We collected all vulnerabilities reported in NVD for the three systems under study using the VulData7 framework [23]. VulData7 automatically retrieves all declared bug reports and patches by crawling NVD.…”
Section: Data Collectionmentioning
confidence: 99%
“…However, to reduce this threat, we studied three large open-source systems with a large number (3-4 times larger than in previous studies) of real (reported in NVD) vulnerabilities. Moreover, we use a publicly available tool (VulData7 [23]) for data collection and report the followed procedure in order to allow other researcher to replicate and extend our work.…”
Section: Threats To Validitymentioning
confidence: 99%
“…Jimenez et al [8] developed VulData7, an extensible framework (and dataset) of real vulnerabilities, automatically collected from software archives. VulData7 is a general framework that contains vulnerabilities for four security-critical open source project languages at the file level.…”
Section: Related Workmentioning
confidence: 99%
“…Nonetheless, the practical usability of a model depends highly on its ability to localize its prediction (i.e., to provide as fine-grained hit as possible). Most of the state-of-the-art vulnerability prediction models provide prediction results at file [3,8,12,16,21], binary [22] or class [19] level, but even the most fine-grained results stop at the level of functions/methods [4,19]. It means that developers need to explore large chunks of code to confirm and identify the exact spot and type of vulnerability predicted by a model.…”
Section: Introductionmentioning
confidence: 99%
“…In their work, Jimenez et al [8] proposed an extensible framework (Vul-Data7) and dataset of real vulnerabilities, automatically collected from software archives. They presented the capabilities of their framework on 4 large systems, but one can extend the framework to meet specific needs.…”
Section: Rq2: How Do Vulnerability Mitigation Patches Affect Test Code?mentioning
confidence: 99%