2019
DOI: 10.1371/journal.pone.0221530
|View full text |Cite
|
Sign up to set email alerts
|

Open source software security vulnerability detection based on dynamic behavior features

Abstract: Open source software has been widely used in various industries due to its openness and flexibility, but it also brings potential security problems. Therefore, security analysis is required before using open source software. The current mainstream open source software vulnerability analysis technology is based on source code, and there are problems such as false positives, false negatives and restatements. In order to solve the problems, based on the further study of behavior feature extraction and vulnerabili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Ultrasonic data acquisition refers to the analysis of the source code or binary code of the program without running the program [16][17][18]. rough ultrasonic data acquisition, a clear framework understanding of the program can be realized, and the combination of dynamic and static is realized according to the corresponding ultrasonic data acquisition, focusing on solving the problem of false alarm rate [19,20].…”
Section: Binary Program Ultrasonic Data Acquisitionmentioning
confidence: 99%
“…Ultrasonic data acquisition refers to the analysis of the source code or binary code of the program without running the program [16][17][18]. rough ultrasonic data acquisition, a clear framework understanding of the program can be realized, and the combination of dynamic and static is realized according to the corresponding ultrasonic data acquisition, focusing on solving the problem of false alarm rate [19,20].…”
Section: Binary Program Ultrasonic Data Acquisitionmentioning
confidence: 99%
“…Therefore, we suggest open source software developers to check vulnerabilityrelated code on a regular basis. [33] and flaw function heuristic [34]. We can also recommend researchers to consider future work, as follows:…”
Section: Implication and Recommendationmentioning
confidence: 99%
“…The out of sample error is mathematically calculated using the given formula. (6) Where, denotes an out of sample error of weak classifiers, represents the expected error, is the empirical error. Depends on the error rate, the weight of each weak learner is readjusted known as re-weighting.…”
Section: (3)mentioning
confidence: 99%
“…But the performance of defect prediction was not improved while considering the more projects. A CNN-IndRNN model was developed in [6] to identify the open-source software defects for enhancing the software quality with dynamic features. But, the time was not reduced.…”
Section: Introductionmentioning
confidence: 99%