2009 International Conference on Availability, Reliability and Security 2009
DOI: 10.1109/ares.2009.163
|View full text |Cite
|
Sign up to set email alerts
|

Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 39 publications
(35 citation statements)
references
References 14 publications
0
35
0
Order By: Relevance
“…An alternative is to apply static analysis tools against the FOSS component. Such analysis requires a solid understanding of the FOSS source code [3], as well as expertise in the tools [11], as they can generate thousands of potentially false warnings for large projects. Further, the analysis may require days for processing even a single 'FOSS-release', 'main-application' pair [12].…”
Section: Is With University Of Luxembourg Luxembourg (He Performed Pmentioning
confidence: 99%
See 3 more Smart Citations
“…An alternative is to apply static analysis tools against the FOSS component. Such analysis requires a solid understanding of the FOSS source code [3], as well as expertise in the tools [11], as they can generate thousands of potentially false warnings for large projects. Further, the analysis may require days for processing even a single 'FOSS-release', 'main-application' pair [12].…”
Section: Is With University Of Luxembourg Luxembourg (He Performed Pmentioning
confidence: 99%
“…Figure 5 provides an intuition about the size of the changes made when fixing the CVEs from our sample. It combines the following three histograms: (1) the number of modified files; 11 (2) the number of modified Java methods; (3) the number of distinct added/deleted lines of code. In the majority of cases (51 out of 55), at most 5 files were modified, while in 29 cases it was only 1 file.…”
Section: Data Selectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Implementation vulnerabilities such as buffer overflows are added to the source while the developer writes it. For these types of vulnerabilities, static code analysis tools can be used for early detection [3,4]. Design vulnerabilities on the other hand can be introduced into the product before there is any source code to examine.…”
Section: Introductionmentioning
confidence: 99%