[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …
to cause harm or loss. Previous work has proposed a number of automated machine …
Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
Y Shin, A Meneely, L Williams… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Security inspection and testing require experts in security who think like an attacker. Security
experts need to know code locations on which to focus their testing and inspection efforts …
experts need to know code locations on which to focus their testing and inspection efforts …
Learning to predict severity of software vulnerability using only vulnerability description
Software vulnerabilities pose significant security risks to the host computing system. Faced
with continuous disclosure of software vulnerabilities, system administrators must prioritize …
with continuous disclosure of software vulnerabilities, system administrators must prioritize …
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities
I Chowdhury, M Zulkernine - Journal of Systems Architecture, 2011 - Elsevier
Software security failures are common and the problem is growing. A vulnerability is a
weakness in the software that, when exploited, causes a security failure. It is difficult to detect …
weakness in the software that, when exploited, causes a security failure. It is difficult to detect …
Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey
With an enormous range of applications, the Internet of Things (IoT) has magnetized
industries and academicians from everywhere. IoT facilitates operations through ubiquitous …
industries and academicians from everywhere. IoT facilitates operations through ubiquitous …
Defending connected vehicles against malware: Challenges and a solution framework
T Zhang, H Antunes, S Aggarwal - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
Vehicles face growing security threats as they become increasingly connected with the
external world. Hackers, researchers, and car hobbyists have compromised security keys …
external world. Hackers, researchers, and car hobbyists have compromised security keys …
Robot cybersecurity, a review
V Mayoral-Vilches - International Journal of Cyber Forensics and …, 2022 - conceptechint.net
Robots are often shipped insecure and in some cases fully unprotected. The rationale
behind is threefold: first, defensive security mechanisms for robots are still in their early …
behind is threefold: first, defensive security mechanisms for robots are still in their early …
The secret life of software vulnerabilities: A large-scale empirical study
E Iannone, R Guadagni, F Ferrucci… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Software vulnerabilities are weaknesses in source code that can be potentially exploited to
cause loss or harm. While researchers have been devising a number of methods to deal …
cause loss or harm. While researchers have been devising a number of methods to deal …
Can traditional fault prediction models be used for vulnerability prediction?
Y Shin, L Williams - Empirical Software Engineering, 2013 - Springer
Finding security vulnerabilities requires a different mindset than finding general faults in
software—thinking like an attacker. Therefore, security engineers looking to prioritize …
software—thinking like an attacker. Therefore, security engineers looking to prioritize …
Security of cryptocurrency using hardware wallet and qr code
Today, the privacy and the security of any organization are the key requirement, the digital
online transaction of money or coins also needed a certain level of security not only during …
online transaction of money or coins also needed a certain level of security not only during …