2021 17th European Dependable Computing Conference (EDCC) 2021
DOI: 10.1109/edcc53658.2021.00008
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning to Combine Static Analysis Alerts with Software Metrics to Detect Security Vulnerabilities: An Empirical Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 18 publications
0
1
0
Order By: Relevance
“…The quality of the selected features greatly affects the performance of the final ML model [23]. Inspired by Pereira et al [63], we use 25 function-level ML features that can semantically be grouped into software metric-and SAST-based feature classes. We thereby focused to compile a set of lightweight features that can be easily extracted from the source code using freely available tools, or already exist as test artifacts (e.g., are generated whenever a software change is committed), yet are indicative enough to reliably predict vulnerable code.…”
Section: Featurementioning
confidence: 99%
See 2 more Smart Citations
“…The quality of the selected features greatly affects the performance of the final ML model [23]. Inspired by Pereira et al [63], we use 25 function-level ML features that can semantically be grouped into software metric-and SAST-based feature classes. We thereby focused to compile a set of lightweight features that can be easily extracted from the source code using freely available tools, or already exist as test artifacts (e.g., are generated whenever a software change is committed), yet are indicative enough to reliably predict vulnerable code.…”
Section: Featurementioning
confidence: 99%
“…• Number of lines in a function flagged as potentially vulnerable by CodeChecker, CodeQL, Cppcheck, Flawfinder, Infer, and AddressSanitizer (both absolute and relative to LoC) • Number of lines in a function flagged as potentially vulnerable by all SAST-tools (with/without ASAN; both absolute and relative to LoC) Pereira et al [63] employed in their work similar features to those above. Moreover, they show that using them in combination with software metrics leads to better prediction of vulnerable files than using only one of the two feature classes.…”
Section: • Number Of Incoming Calls Of a Function (Both Absolute And ...mentioning
confidence: 99%
See 1 more Smart Citation
“…There is a sufficient number of methodological approaches and methods for the analysis of MC [ 9 , 10 , 11 ]. However, the primary task is to determine the architecture of the processor (hereinafter–Architecture), for execution on which this MC is intended [ 12 , 13 , 14 ].…”
Section: Introductionmentioning
confidence: 99%