Results 11 to 20 of about 372,889 (280)
With the rapid growth of IoT devices, ensuring the security of embedded firmware has become a critical concern. Despite advances in existing vulnerability discovery methods, previous research has been limited to vulnerabilities occurring in binary ...
Xixing Li, Qiang Wei, Zehui Wu, Wei Guo
doaj +1 more source
Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects
Security vulnerabilities are present in most software systems, especially in projects with a large codebase, with several versions over the years, developed by many developers.
Jose D'Abruzzo Pereira +2 more
doaj +1 more source
A Context-Aware Neural Embedding for Function-Level Vulnerability Detection
Exploitable vulnerabilities in software systems are major security concerns. To date, machine learning (ML) based solutions have been proposed to automate and accelerate the detection of vulnerabilities. Most ML techniques aim to isolate a unit of source
Hongwei Wei +3 more
doaj +1 more source
Vulnerability detection with fine-grained interpretations [PDF]
Despite the successes of machine learning (ML) and deep learning (DL) based vulnerability detectors (VD), they are limited to providing only the decision on whether a given code is vulnerable or not, without details on what part of the code is relevant to the detected vulnerability.
Li, Yi, Wang, Shaohua, Nguyen, Tien N.
openaire +2 more sources
VulEye: A Novel Graph Neural Network Vulnerability Detection Approach for PHP Application
Following advances in machine learning and deep learning processing, cyber security experts are committed to creating deep intelligent approaches for automatically detecting software vulnerabilities.
Chun Lin +3 more
doaj +1 more source
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li +3 more
doaj +1 more source
Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network
With the blooming of blockchain-based smart contracts in decentralized applications, the security problem of smart contracts has become a critical issue, as vulnerable contracts have resulted in severe financial losses.
Yujian Zhang, Daifu Liu
doaj +1 more source
Research on context-aware Android application vulnerability detection
The vulnerability detection model of Android application based on learning lacks semantic features.The extracted features contain noise data unrelated to vulnerabilities, which leads to the false positive of vulnerability detection model.A feature ...
Jiawei QIN +4 more
doaj +2 more sources
Improving Security of Web Servers in Critical IoT Systems through Self-Monitoring of Vulnerabilities
IoT (Internet of Things) systems are complex ones that may comprise large numbers of sensing and actuating devices; and servers that store data and further configure the operation of such devices.
Linxuan Song, Marisol GarcĂa-Valls
doaj +1 more source
Distilled and Contextualized Neural Models Benchmarked for Vulnerable Function Detection
Detecting vulnerabilities in programs is an important yet challenging problem in cybersecurity. The recent advancement in techniques of natural language understanding enables the data-driven research on automated code analysis to embrace Pre-trained ...
Guanjun Lin, Heming Jia, Di Wu
doaj +1 more source

