A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

Automatic vulnerability detection in embedded devices and firmware: Survey and layered taxonomies

A Qasem, P Shirani, M Debbabi, L Wang… - ACM Computing …, 2021 - dl.acm.org
In the era of the internet of things (IoT), software-enabled inter-connected devices are of
paramount importance. The embedded systems are very frequently used in both security …

Metamorphic testing for web system security

NB Chaleshtari, F Pastore, A Goknil… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Security testing aims at verifying that the software meets its security properties. In modern
Web systems, however, this often entails the verification of the outputs generated when …

Improving function coverage with munch: a hybrid fuzzing and directed symbolic execution approach

S Ognawala, T Hutzelmann, E Psallida… - Proceedings of the 33rd …, 2018 - dl.acm.org
Fuzzing and symbolic execution are popular techniques for finding vulnerabilities and
generating test-cases for programs. Fuzzing, a blackbox method that mutates seed input …

Memfix: static analysis-based repair of memory deallocation errors for c

J Lee, S Hong, H Oh - Proceedings of the 2018 26th ACM Joint meeting …, 2018 - dl.acm.org
We present MemFix, an automated technique for fixing memory deallocation errors in C
programs. MemFix aims to fix memory-leak, double-free, and use-after-free errors, which …

Metamorphic security testing for web systems

PX Mai, F Pastore, A Goknil… - 2020 IEEE 13th …, 2020 - ieeexplore.ieee.org
Security testing verifies that the data and the resources of software systems are protected
from attackers. Unfortunately, it suffers from the oracle problem, which refers to the …

UMLsecRT: reactive security monitoring of java applications with round-trip engineering

S Peldszus, J Bürger, J Jürjens - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Today's software systems tend to be long-living and often process security-critical data, so
keeping up with ever-changing security measures, attacks, and mitigations is critical to …

A natural language programming approach for requirements-based security testing

XP Mai, F Pastore, A Göknil, L Briand - 29th IEEE International …, 2018 - orbilu.uni.lu
To facilitate communication among stakeholders, software security requirements are
typically written in natural language and capture both positive requirements (ie, what the …

Advances in symbolic execution

G Yang, A Filieri, M Borges, D Clun, J Wen - Advances in Computers, 2019 - Elsevier
Symbolic execution is a systematic technique for checking programs, which forms a basis for
various software testing and verification techniques. It provides a powerful analysis in …

Automatically assessing vulnerabilities discovered by compositional analysis

S Ognawala, RN Amato, A Pretschner… - Proceedings of the 1st …, 2018 - dl.acm.org
Testing is the most widely employed method to find vulnerabilities in real-world software
programs. Compositional analysis, based on symbolic execution, is an automated testing …