2016
DOI: 10.1007/s11432-015-5422-7
|View full text |Cite
|
Sign up to set email alerts
|

A static technique for detecting input validation vulnerabilities in Android apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Pattern-based detectors can be further divided into rule-based ones and machine learningbased ones. Rule-based detectors [6], [7], [8], [9], [10], [11] can identify the vulnerable lines of code when they indeed correctly detect vulnerabilities, but often incur a low detection capability (because of their high false-positives and high false-negatives). Moreover, they require human analysts to define vulnerability detection rules.…”
Section: Introductionmentioning
confidence: 99%
“…Pattern-based detectors can be further divided into rule-based ones and machine learningbased ones. Rule-based detectors [6], [7], [8], [9], [10], [11] can identify the vulnerable lines of code when they indeed correctly detect vulnerabilities, but often incur a low detection capability (because of their high false-positives and high false-negatives). Moreover, they require human analysts to define vulnerability detection rules.…”
Section: Introductionmentioning
confidence: 99%
“…The third category is the academic research methods. These academic research results are generally targeted at certain aspects of vulnerability detection and propose better vulnerability rules [39], [40], [41]. This approach largely relies on human experts to define rules.…”
Section: Rule-based Vulnerability Detectionmentioning
confidence: 99%
“…This types of approaches involve three categories: rule-based methods, traditional machine learning-based methods, and deep learning-based methods. Rule-based methods [4]- [8] and traditional machine learning-based methods [9]- [12] typically require human experts to define rules or features to generate vulnerability patterns. As a result, they need many manual efforts and are difficult to characterize the vulnerabilities accurately, thus achieve high false positives or high false negatives.…”
Section: Code Similarity-based Approaches Are Limited To Detectingmentioning
confidence: 99%