2020
DOI: 10.1007/978-3-030-58811-3_69
|View full text |Cite
|
Sign up to set email alerts
|

Inspecting JavaScript Vulnerability Mitigation Patches with Automated Fix Generation in Mind

Abstract: Software security has become a primary concern for both the industry and academia in recent years. As dependency on critical services provided by software systems grows globally, a potential security threat in such systems poses higher and higher risks (e.g. economical damage, a threat to human life, criminal activity). Finding potential security vulnerabilities at the code level automatically is a very popular approach to aid security testing. However, most of the methods based on machine learning … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 15 publications
(21 reference statements)
0
1
0
Order By: Relevance
“…Analysis of vulnerability fixing patches Similar to how the vulnerable code in CVEfixes can be used to better understand how security vulnerabilities are introduced in code and how these can be automatically predicted, the fixes offered by CVEfixes can be used to analyze and build on vulnerability fixing patches. Several studies have already initiated research analyzing such patches, such as the detection of patterns that can be used in automated program repair [41], and the identification of security-relevant commits, also known as pre-patches, as these may inadvertently leak information about security vulnerabilities before the CVE is published [42,43]. Other research has analyzed vulnerability fixing patches to facilitate the automated transformation of patches into "honeypots" that help trap malicious actors and detect if the corresponding vulnerabilities are exploited in the wild [44].…”
Section: Automated Vulnerability Prediction/identificationmentioning
confidence: 99%
“…Analysis of vulnerability fixing patches Similar to how the vulnerable code in CVEfixes can be used to better understand how security vulnerabilities are introduced in code and how these can be automatically predicted, the fixes offered by CVEfixes can be used to analyze and build on vulnerability fixing patches. Several studies have already initiated research analyzing such patches, such as the detection of patterns that can be used in automated program repair [41], and the identification of security-relevant commits, also known as pre-patches, as these may inadvertently leak information about security vulnerabilities before the CVE is published [42,43]. Other research has analyzed vulnerability fixing patches to facilitate the automated transformation of patches into "honeypots" that help trap malicious actors and detect if the corresponding vulnerabilities are exploited in the wild [44].…”
Section: Automated Vulnerability Prediction/identificationmentioning
confidence: 99%