Results 11 to 20 of about 372,889 (280)

Finding Taint-Style Vulnerabilities in Lua Application of IoT Firmware with Progressive Static Analysis

open access: yesApplied Sciences, 2023
With the rapid growth of IoT devices, ensuring the security of embedded firmware has become a critical concern. Despite advances in existing vulnerability discovery methods, previous research has been limited to vulnerabilities occurring in binary ...
Xixing Li, Qiang Wei, Zehui Wu, Wei Guo
doaj   +1 more source

Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects

open access: yesIEEE Access, 2021
Security vulnerabilities are present in most software systems, especially in projects with a large codebase, with several versions over the years, developed by many developers.
Jose D'Abruzzo Pereira   +2 more
doaj   +1 more source

A Context-Aware Neural Embedding for Function-Level Vulnerability Detection

open access: yesAlgorithms, 2021
Exploitable vulnerabilities in software systems are major security concerns. To date, machine learning (ML) based solutions have been proposed to automate and accelerate the detection of vulnerabilities. Most ML techniques aim to isolate a unit of source
Hongwei Wei   +3 more
doaj   +1 more source

Vulnerability detection with fine-grained interpretations [PDF]

open access: yesProceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Despite the successes of machine learning (ML) and deep learning (DL) based vulnerability detectors (VD), they are limited to providing only the decision on whether a given code is vulnerable or not, without details on what part of the code is relevant to the detected vulnerability.
Li, Yi, Wang, Shaohua, Nguyen, Tien N.
openaire   +2 more sources

VulEye: A Novel Graph Neural Network Vulnerability Detection Approach for PHP Application

open access: yesApplied Sciences, 2023
Following advances in machine learning and deep learning processing, cyber security experts are committed to creating deep intelligent approaches for automatically detecting software vulnerabilities.
Chun Lin   +3 more
doaj   +1 more source

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

open access: yesApplied Sciences, 2020
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li   +3 more
doaj   +1 more source

Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network

open access: yesFuture Internet, 2022
With the blooming of blockchain-based smart contracts in decentralized applications, the security problem of smart contracts has become a critical issue, as vulnerable contracts have resulted in severe financial losses.
Yujian Zhang, Daifu Liu
doaj   +1 more source

Research on context-aware Android application vulnerability detection

open access: yesTongxin xuebao, 2021
The vulnerability detection model of Android application based on learning lacks semantic features.The extracted features contain noise data unrelated to vulnerabilities, which leads to the false positive of vulnerability detection model.A feature ...
Jiawei QIN   +4 more
doaj   +2 more sources

Improving Security of Web Servers in Critical IoT Systems through Self-Monitoring of Vulnerabilities

open access: yesSensors, 2022
IoT (Internet of Things) systems are complex ones that may comprise large numbers of sensing and actuating devices; and servers that store data and further configure the operation of such devices.
Linxuan Song, Marisol GarcĂ­a-Valls
doaj   +1 more source

Distilled and Contextualized Neural Models Benchmarked for Vulnerable Function Detection

open access: yesMathematics, 2022
Detecting vulnerabilities in programs is an important yet challenging problem in cybersecurity. The recent advancement in techniques of natural language understanding enables the data-driven research on automated code analysis to embrace Pre-trained ...
Guanjun Lin, Heming Jia, Di Wu
doaj   +1 more source

Home - About - Disclaimer - Privacy