2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) 2018
DOI: 10.1109/dsc.2018.00017
|View full text |Cite
|
Sign up to set email alerts
|

The Coming Era of AlphaHacking?: A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques

Abstract: With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, the topic of Autonomous Cyber Reasoning System (CRS) has recently attracted extensive attention from both industry and academia. Utilizing automated system to detect, exploit and patch software vulnerabilities seems so attractive because of its scalability and cost-efficiency compared with the human expert based solution. In this paper, we give an extensive survey of former representative works related to the underlying technologies of a C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 47 publications
0
13
0
Order By: Relevance
“…Zheng et al (2021) evaluated vulnerability detection on source codes while Nguyen et al (2019) used machine learning to design SCDAN (Semi-supervised Code Domain Adaptation Network) that will predict the vulnerability detection performance. Ji et al (2018) investigated the capability of machine learning but Russell et al (2018) used machine learning and the features of C and C++ to develop vulnerability detection system. Li and Shao (2019) made use of the features of machine learning to analyze the problems and challenges of software vulnerability detection.…”
Section: Analysis and Resultsmentioning
confidence: 99%
“…Zheng et al (2021) evaluated vulnerability detection on source codes while Nguyen et al (2019) used machine learning to design SCDAN (Semi-supervised Code Domain Adaptation Network) that will predict the vulnerability detection performance. Ji et al (2018) investigated the capability of machine learning but Russell et al (2018) used machine learning and the features of C and C++ to develop vulnerability detection system. Li and Shao (2019) made use of the features of machine learning to analyze the problems and challenges of software vulnerability detection.…”
Section: Analysis and Resultsmentioning
confidence: 99%
“…Wang et al [77] reviewed machine learning-based fuzzing techniques for vulnerability discovery. Ji et al [24] briefly reviewed the studies of adopting automated systems for detecting, patching, and exploiting software vulnerabilities.…”
Section: Related Reviewsmentioning
confidence: 99%
“…As software becomes more and more complicated, software vulnerabilities caused by design flaws and implementation errors become an inevitable problem in engineering [1]. According to statistics released by the Common Vulnerabilities and Exposures (CVE) [2] and National Vulnerability Database (NVD) [3], the number of software vulnerabilities has increased from 1600 to nearly 100000 since 1999 [4]. Software systems containing these vulnerabilities will face serious security risks.…”
Section: Introductionmentioning
confidence: 99%