2017
DOI: 10.5120/ijca2017914750
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Software Vulnerability Detection Methods and Tools: A Review

Abstract: Software vulnerability remains a serious problem among industry players in the world today because of the numerous security related challenges it possess to end-users and stakeholders. Although previous studies have proposed various methods and tools that can be used in reducing or eliminating software vulnerability, those studies, however, raised several additional questions that need be addressed: (1) Can all the tools be used in curbing software vulnerabilities.(2) Can a specific tool detect all software vu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…e detection of specific vulnerabilities requires several corresponding methods. For example, the detection of vulnerabilities that are easily triggered by overflow of values, divisors of 0, etc., needs to be identified and analyzed [10][11][12].…”
Section: Ultrasonic Data Acquisition and Signal Processing Algorithmsmentioning
confidence: 99%
“…e detection of specific vulnerabilities requires several corresponding methods. For example, the detection of vulnerabilities that are easily triggered by overflow of values, divisors of 0, etc., needs to be identified and analyzed [10][11][12].…”
Section: Ultrasonic Data Acquisition and Signal Processing Algorithmsmentioning
confidence: 99%
“…Therefore, these analyzers cannot guarantee complete test coverage of the codebase. As the complexity of software increases, these methods are limited by high false positive rates and low true performance [22], often generating a large number of false positives and not being able to understand the semantics of the code well. In addition, the identification of unbalanced real-world vulnerability data cannot fully exert its advantages due to the small amount of data.…”
Section: Related Workmentioning
confidence: 99%
“…In conventional methods of detecting computer network security vulnerabilities, inspectors typically must interact with computer terminals and rely on various vulnerability detection tools. However, these tools often exhibit significant limitations in practical use, including issues related to accuracy, speed, and the associated high costs of vulnerability detection [2].…”
Section: Literature Reviewmentioning
confidence: 99%