2020
DOI: 10.1007/s13198-020-01036-0
|View full text |Cite
|
Sign up to set email alerts
|

Extracting rules for vulnerabilities detection with static metrics using machine learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(24 citation statements)
references
References 21 publications
0
24
0
Order By: Relevance
“…For the outside XSS, the exploit is executed through the browser. Paper [16] has addressed identification of characteristic exploitation in PHP code. It extends the traditional custom design with a component called cleans.…”
Section: Related Workmentioning
confidence: 99%
“…For the outside XSS, the exploit is executed through the browser. Paper [16] has addressed identification of characteristic exploitation in PHP code. It extends the traditional custom design with a component called cleans.…”
Section: Related Workmentioning
confidence: 99%
“…Many studies [10,26,75,79,83,95,100,120,137,148,163,205,215,220,229,238,244,246,271,279,350,366] created their own datasets. Ali Alatwi et al [10], Cui et al [83], Ma et al [205], and Gupta et al [120] created datasets to train vulnerability detectors for Android applications.…”
Section: Vulnerability Analysismentioning
confidence: 99%
“…Many studies [10,26,75,79,83,95,100,120,137,148,163,205,215,220,229,238,244,246,271,279,350,366] created their own datasets. Ali Alatwi et al [10], Cui et al [83], Ma et al [205], and Gupta et al [120] created datasets to train vulnerability detectors for Android applications. In particular, Ma et al [205] decompiled and generated cfgs of approximately 10 thousand, both benign and vulnerable, Android applications from AndroZoo and Android Malware datasets; Ali Alatwi et al [10] collected 5,063 Android applications where 1,000 of them were marked as benign and the remaining as malware; Cui et al [83] selected an open-source dataset comprised of 1,179 Android applications that have 4,416 different version (of the 1,179 applications) and labeled the selected dataset by using the Androrisk tool; and Gupta et al [120] used two Android applications (Android-universalimage-loader and JHotDraw) which they have manually labeled based on the projects pmd reports (true if a vulnerability was reported in a pmd file and false otherwise).…”
Section: Vulnerability Analysismentioning
confidence: 99%
“…With the use of ML, vulnerability detection rules were extracted with static metrics as discussed in [122]. Thirty-two supervised ML algorithms were considered for most common vulnerabilities and identified that when the model used the J48 ML algorithm, 96% accuracy could be obtained in vulnerability detection.…”
Section: Applying ML To Detect Source Code Vulnerabilitiesmentioning
confidence: 99%