2019 9th Latin-American Symposium on Dependable Computing (LADC) 2019
DOI: 10.1109/ladc48089.2019.8995685
|View full text |Cite
|
Sign up to set email alerts
|

An Exploratory Study on Machine Learning to Combine Security Vulnerability Alerts from Static Analysis Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Dataset preparation: Authors used existing labeled datasets as well as created their own datasets to train ml models. Specifically, a set of studies [48,156,219,243,254,263,298] used available labeled datasets for php, Java, C, C++, and Android applications to train vulnerability detection models. In other cases, Russell et al [261] extended an existing dataset with millions of C and C++ functions and then labeled it based on the output of three static analyzers (i.e., Clang, CppCheck, and Flawfinder).…”
Section: Vulnerability Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…Dataset preparation: Authors used existing labeled datasets as well as created their own datasets to train ml models. Specifically, a set of studies [48,156,219,243,254,263,298] used available labeled datasets for php, Java, C, C++, and Android applications to train vulnerability detection models. In other cases, Russell et al [261] extended an existing dataset with millions of C and C++ functions and then labeled it based on the output of three static analyzers (i.e., Clang, CppCheck, and Flawfinder).…”
Section: Vulnerability Analysismentioning
confidence: 99%
“…Repository and file metrics: Perl et al [244] collected GitHub repository meta-data (i.e., programming language, star count, fork count, and number of commits) in addition to source code metrics. Other authors [95,243] used file meta-data such as files' creation and modification time, machine type, file size, and linker version.…”
Section: Vulnerability Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we review the main and recent studies about the combination of different types of web applications security analysis tools with the main objectives of discovering more vulnerabilities and reducing the number of false positives. Several works combine static analysis tools with machine learning techniques for automatic detection of security vulnerabilities in web applications reducing the number of false positives [52,53]. Other approximations are based in attacks and anomalies detection using machine learning techniques [54].…”
Section: Related Workmentioning
confidence: 99%