Silent vulnerable dependency alert prediction with vulnerability key aspect explanation
Due to convenience, open-source software is widely used. For beneficial reasons, open-
source maintainers often fix the vulnerabilities silently, exposing their users unaware of the …
source maintainers often fix the vulnerabilities silently, exposing their users unaware of the …
Multilevel semantic embedding of software patches: a fine-to-coarse grained approach towards security patch detection
The growth of open-source software has increased the risk of hidden vulnerabilities that can
affect downstream software applications. This concern is further exacerbated by software …
affect downstream software applications. This concern is further exacerbated by software …
Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes
M Han, L Wang, J Chang, B Li… - 2024 IEEE 35th …, 2024 - ieeexplore.ieee.org
Software projects are dependent on many third-party libraries, therefore high-risk
vulnerabilities can propagate through the dependency chain to downstream projects. Owing …
vulnerabilities can propagate through the dependency chain to downstream projects. Owing …
Strengthening Supply Chain Security with Fine-grained Safe Patch Identification
Enhancing supply chain security is crucial, often involving the detection of patches in
upstream software. However, current security patch analysis works yield relatively low recall …
upstream software. However, current security patch analysis works yield relatively low recall …
AI-Enhanced Software Vulnerability and Security Patch Analysis
X Wang - 2023 - search.proquest.com
With the increasing popularity of open-source software (OSS), their embedded
vulnerabilities have been widely propagating to downstream software. Although timely …
vulnerabilities have been widely propagating to downstream software. Although timely …
Understanding the social aspects of software security
S Yousefi - 2021 - dspace.library.uvic.ca
Context: Security is a critical non-functional requirement that remains to be adequately
addressed in software development. Security breaches occur with surprising regularity and …
addressed in software development. Security breaches occur with surprising regularity and …
Semantic Patch Embedding for Security Detection: A Fine-to-Coarse Grained Approach
The surge in open-source software usage has heightened the risk of concealed
vulnerabilities impacting downstream applications. Compounded by vendors silently …
vulnerabilities impacting downstream applications. Compounded by vendors silently …
面向项目版本差异性的漏洞识别技术研究
黄诚, 孙明旭, 段仁语, 吴苏晟, 陈斌 - 网络与信息安全学报, 2022 - infocomm-journal.com
开源代码托管**台为软件开发行业带来了活力和机遇, 但存在诸多安全隐患.
开源代码的不规范性, 项目依赖库的复杂性, 漏洞披露**台收集漏洞的被动性等问题都影响着 …
开源代码的不规范性, 项目依赖库的复杂性, 漏洞披露**台收集漏洞的被动性等问题都影响着 …
[CITATION][C] Improving Quality of Programming and Software through Knowledge Graph Construction and Application
SUN Jiamou - 2023 - The Australian National University
[CITATION][C] 开源软件供应链安全研究综述
纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿… - 软件学报, 2022