Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics 2018
DOI: 10.1145/3180445.3180453
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Methods for Software Vulnerability Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(32 citation statements)
references
References 14 publications
0
30
0
2
Order By: Relevance
“…It is used for the protection of secret data or control-flow graphs (CFGs) of a program. [113] Machine learning methods e contribution of this paper is a methodology for analyzing features from C source code to classify functions as vulnerable or nonvulnerable.…”
Section: Hybrid Reputation Modelmentioning
confidence: 99%
“…It is used for the protection of secret data or control-flow graphs (CFGs) of a program. [113] Machine learning methods e contribution of this paper is a methodology for analyzing features from C source code to classify functions as vulnerable or nonvulnerable.…”
Section: Hybrid Reputation Modelmentioning
confidence: 99%
“…While bug reports were taken as input in that study, in many other studies, source code is taken as input. Text mining is a highly preferred technique for obtaining features directly from source codes as in the studies [65][66][67][68][69]. Several studies [63,70] have compared text mining-based models and software metrics-based models.…”
Section: Data Mining In Vulnerability Analysismentioning
confidence: 99%
“…Software metrics. Some studies [2], [23], [24] investigate whether software metrics obtained from source code and development history are discriminative and predictive of vulnerable code locations. For example, Shin et al [2] examined the applicability of three types of software metrics (complexity, code churn, and developer activity) to build vulnerability prediction models.…”
Section: Related Workmentioning
confidence: 99%
“…They performed empirical analyses on two open-source projects, the Mozilla Firefox and the Red Hat Enterprise Linux kernel, and found that 24 of the 28 metrics collected are discriminative of vulnerabilities for both projects. Another work [24] demonstrated that some trivial software metrics such as character diversity, string entropy, function length and nesting depth could be useful indicators for vulnerability detection.…”
Section: Related Workmentioning
confidence: 99%