2022
DOI: 10.1016/j.jss.2022.111283
|View full text |Cite
|
Sign up to set email alerts
|

Just-in-time software vulnerability detection: Are we there yet?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(15 citation statements)
references
References 46 publications
0
15
0
Order By: Relevance
“…2) Generalization to Diverse Vulnerabilities: Current vulnerability prediction methods often focus on specific types of vulnerabilities or employ a single generic model to handle multiple vulnerabilities. However, this approach may limit predictive performance and generalization when dealing with diverse and complex vulnerabilities [30]. Our MTLPT method focuses on the five most frequent vulnerability types in the real world, enhancing the model's understanding of both differences and commonalities among vulnerabilities through multi-task learning.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…2) Generalization to Diverse Vulnerabilities: Current vulnerability prediction methods often focus on specific types of vulnerabilities or employ a single generic model to handle multiple vulnerabilities. However, this approach may limit predictive performance and generalization when dealing with diverse and complex vulnerabilities [30]. Our MTLPT method focuses on the five most frequent vulnerability types in the real world, enhancing the model's understanding of both differences and commonalities among vulnerabilities through multi-task learning.…”
Section: Discussionmentioning
confidence: 99%
“…The basic idea of ensemble learning is: a group of "experts" (i.e., different models) collectively make decisions that are usually better than any single expert's decision. Ensemble learning methods are mainly divided into two categories: Bagging [27] (Bootstrap Aggregating) such as Random Forest [28] (RF), Boosting [29] such as: AdaBoost [30], they all improve the overall accuracy by combining the prediction results of multiple simple models. For example, using multiple decision trees to vote to determine whether a code snippet may contain vulnerabilities [29].…”
Section: Ensemble Learning Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In some cases metrics like the code's entropy, number of characters, number of conditional sentences, among others, are applied [20], [28]. Other works also play with cyclomatic complexity [9], [20], use dependency and control flow graphs [10], [22], [24], [25], [27], [30]- [34], even work at token level [23], use vectors to represent assorted information [8], [19], [21], [26] or directly apply the code [29]. Once features are extracted, machine learning algorithms are used in all cases, being neural networks the most common one, specially MLP, though some works also use DNN, like [29].…”
Section: A Vulnerability Detectionmentioning
confidence: 99%
“…S OFTWARE exploitation and protection mechanisms are considered an arms race between attackers and defenders. The prevalence of software vulnerabilities and weak memory protection practices allow attackers to corrupt the memory space of the vulnerable applications to run a malicious arbitrary code [1]. Memory safety vulnerabilities are made possible due to the inherent characteristics of modernday computing architecture.…”
Section: Introductionmentioning
confidence: 99%