2022
DOI: 10.2139/ssrn.4044439
|View full text |Cite
|
Sign up to set email alerts
|

A Critical Comparison on Six Static Analysis Tools: Detection Agreement and Precision

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…In the past, several empirical static analysis comparison studies have been conducted, but they tended to overlook Java [30]- [33] or included a wide range of programming language tools, leaving limited attention to Java-specific tools [18], [21], [34]- [37]. Despite this, some studies that specifically targeted Java had either a restricted scope by evaluating only a few security vulnerability categories [19], [20], [26], [38]- [46] or concentrated solely on Android static analysis tools [47]. Now, let's take a closer look at these studies, categorizing them into two subsets: those utilizing only the Juliet Test Suite for evaluation and those that employed real-world programs, with or without using Juliet.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In the past, several empirical static analysis comparison studies have been conducted, but they tended to overlook Java [30]- [33] or included a wide range of programming language tools, leaving limited attention to Java-specific tools [18], [21], [34]- [37]. Despite this, some studies that specifically targeted Java had either a restricted scope by evaluating only a few security vulnerability categories [19], [20], [26], [38]- [46] or concentrated solely on Android static analysis tools [47]. Now, let's take a closer look at these studies, categorizing them into two subsets: those utilizing only the Juliet Test Suite for evaluation and those that employed real-world programs, with or without using Juliet.…”
Section: Related Workmentioning
confidence: 99%
“…Table 5 presents the summary of the related works in this category. Now, we explain the studies in the second subset [18], [19], [21], [31]- [33], [35], [38], [42]- [44], [46], [47]. Katerina Goseva et al [18] investigated the ability of three -unknowncommercial static tools to find Java and C/C++ security flaws.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation