Proceedings of the 2nd International ICST Conference on Scalable Information Systems 2007
DOI: 10.4108/infoscale.2007.910
|View full text |Cite
|
Sign up to set email alerts
|

ISA: A Source Code Static Vulnerability Detection System Based on Data Fusion

Abstract: Static analysis is a kind of effective method to detect the vulnerabilities in the software. Without running the programs, static analysis tools can be used to automatically discover unknown bugs. To cope with the problem of high false positives and false negatives in source code static analysis methods, this paper presents a source code static analysis technology for vulnerability detection based on data fusion. By parsing and making data fusion on the outcome of different static analysis methods, this techno… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 5 publications
0
8
0
1
Order By: Relevance
“…Kong et al [34] show that the alert prioritization generated via data fusion of redundant alerts performed better than the alert prioritization's of the individual tools. Meng et al [38] discussed some of the alerts found by the ASA; however, there were no numerical results on a larger subject program.…”
Section: Prioritization Results Discussionmentioning
confidence: 98%
See 3 more Smart Citations
“…Kong et al [34] show that the alert prioritization generated via data fusion of redundant alerts performed better than the alert prioritization's of the individual tools. Meng et al [38] discussed some of the alerts found by the ASA; however, there were no numerical results on a larger subject program.…”
Section: Prioritization Results Discussionmentioning
confidence: 98%
“…Developers can focus their alert inspection activities on the alerts they are most likely to want to act on. Ten of the 21 studies use information about the alerts themselves to predict actionable alerts [6,21,22,31,32,34,35,38,40,45]. Six of the selected studies utilize information from the development history of a project to use the past to predict the future [6,22,31,32,45,55].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…А в последствии изначальное ранжирование изменяется на основе реакции пользователя в процессе инспекции предупреждений о дефектах. Из других методов стоит выделить ранжирование предупреждений на основе статического вычисления вероятности исполнения мест, для которых предупреждения даны [25], и ранжирование предупреждений на основе слияния результатов нескольких инструментов статического анализа [26,27].…”
Section: ранжированиеunclassified