2017
DOI: 10.1007/978-3-319-60876-1_15
|View full text |Cite
|
Sign up to set email alerts
|

SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…In the Debian system alone, researchers [3] have found 145 cloned 1-day vulnerabilities. Over the last few years, various automatical 1-day vulnerability detection tools for binaries have been proposed [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] to protect users who fail to adopt 1-day vulnerability patches in time.…”
Section: Introductionmentioning
confidence: 99%
“…In the Debian system alone, researchers [3] have found 145 cloned 1-day vulnerabilities. Over the last few years, various automatical 1-day vulnerability detection tools for binaries have been proposed [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] to protect users who fail to adopt 1-day vulnerability patches in time.…”
Section: Introductionmentioning
confidence: 99%
“…These approaches [110,175,[184][185][186] share the same goal with ours. However, as they build vulnerability signature either broadly (e.g., from a whole function)…”
Section: Related Workmentioning
confidence: 81%
“…Then, it uses sub-graph isomorphism matching to discover potentially buggy code. Zou et al [186] proposed SCVD to detect vulnerable code clones. It generates a program feature tree.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations