Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey

SM Ghaffarian, HR Shahriari - ACM computing surveys (CSUR), 2017 - dl.acm.org
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …

The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches

H Hanif, MHNM Nasir, MF Ab Razak, A Firdaus… - Journal of Network and …, 2021 - Elsevier
The detection of software vulnerability requires critical attention during the development
phase to make it secure and less vulnerable. Vulnerable software always invites hackers to …

[PDF][PDF] Survey on software defect prediction techniques

MK Thota, FH Sha**, P Rajesh - International Journal of Applied …, 2020 - ir.lib.cyut.edu.tw
Recent advancements in technology have emerged the requirements of hardware and
software applications. Along with this technical growth, software industries also have faced …

Characteristics and challenges of low-code development: the practitioners' perspective

Y Luo, P Liang, C Wang, M Shahin, J Zhan - Proceedings of the 15th …, 2021 - dl.acm.org
Background: In recent years, Low-code development (LCD) is growing rapidly, and Gartner
and Forrester have predicted that the use of LCD is very promising. Giant companies, such …

The seven sins: Security smells in infrastructure as code scripts

A Rahman, C Parnin, L Williams - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Practitioners use infrastructure as code (IaC) scripts to provision servers and development
environments. While develo** IaC scripts, practitioners may inadvertently introduce …

A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

Committed to trust: A qualitative study on security & trust in open source software projects

D Wermke, N Wöhler, JH Klemmer… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
Open Source Software plays an important role in many software ecosystems. Whether in
operating systems, network stacks, or as low-level system drivers, software we encounter …

Out of sight, out of mind? How vulnerable dependencies affect open-source projects

GAA Prana, A Sharma, LK Shar, D Foo… - Empirical Software …, 2021 - Springer
Context Software developers often use open-source libraries in their project to improve
development speed. However, such libraries may contain security vulnerabilities, and this …

Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding

Z Tian, B Tian, J Lv, Y Chen, L Chen - Expert Systems with Applications, 2024 - Elsevier
The explosive growth of software vulnerabilities poses a serious threat to the system security
and has become one of the urgent problems of the day. However, existing vulnerability …

It's like flossing your teeth: On the importance and challenges of reproducible builds for software supply chain security

M Fourné, D Wermke, W Enck, S Fahl… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The 2020 Solarwinds attack was a tip** point that caused a heightened awareness about
the security of the software supply chain and in particular the large amount of trust placed in …