2015
DOI: 10.1109/tdsc.2014.2373377
|View full text |Cite
|
Sign up to set email alerts
|

Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
55
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 108 publications
(57 citation statements)
references
References 29 publications
2
55
0
Order By: Relevance
“…Inferring from this thought process, authors [37] have worked towards bringing out a substantial patern that illustrates both input validation and sanitisation code which are expected to be the predicted vectors of web application vulnerabilities. They have applied both supervised and semi-supervised learning when building vulnerability predictors based on hybrid code atributes.…”
Section: Detecting Application Security Breachesmentioning
confidence: 99%
“…Inferring from this thought process, authors [37] have worked towards bringing out a substantial patern that illustrates both input validation and sanitisation code which are expected to be the predicted vectors of web application vulnerabilities. They have applied both supervised and semi-supervised learning when building vulnerability predictors based on hybrid code atributes.…”
Section: Detecting Application Security Breachesmentioning
confidence: 99%
“…A recent work [9] employing a hybrid of dynamic and static approach predicted code vulnerabilities against a supervised model which achieved 0.77 (77%) recall value. There was no AUC value provided in the paper to gauge the decency of the model in overall performance.…”
Section: Related Workmentioning
confidence: 99%
“…Shar et al in their paper had proposed the use of a set of hybrid of the static and dynamic code attributes which characterize input validation and input sanitization code patterns [6]. They are in fact expected to be the most important indicators of web application vulnerabilities.…”
Section: Literature Reviewmentioning
confidence: 99%