[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …
to cause harm or loss. Previous work has proposed a number of automated machine …
A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners
S Alazmi, DC De Leon - IEEE Access, 2022 - ieeexplore.ieee.org
Web applications have been a significant target for successful security breaches in the last
few years. They are currently secured, as a primary method, by searching for their …
few years. They are currently secured, as a primary method, by searching for their …
{PentestGPT}: Evaluating and harnessing large language models for automated penetration testing
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally
resisted automation due to the extensive expertise required by human professionals. Large …
resisted automation due to the extensive expertise required by human professionals. Large …
Pentestgpt: An llm-empowered automatic penetration testing tool
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally
resisted automation due to the extensive expertise required by human professionals. Large …
resisted automation due to the extensive expertise required by human professionals. Large …
An algorithm for detecting SQL injection vulnerability using black-box testing
Abstract SQL Injection Attack (SQLIA) is one of the most severe attack that can be used
against web database-driven applications. Attackers use SQLIA to obtain unauthorized …
against web database-driven applications. Attackers use SQLIA to obtain unauthorized …
An overview of vulnerability assessment and penetration testing techniques
S Shah, BM Mehtre - Journal of Computer Virology and Hacking …, 2015 - Springer
All Internet facing systems and applications carry security risks. Security professionals
across the globe generally address these security risks by Vulnerability Assessment and …
across the globe generally address these security risks by Vulnerability Assessment and …
Saphire: Sandboxing {PHP} applications with tailored system call allowlists
Interpreted languages, such as PHP, power a host of platform-independent applications,
including websites, instant messengers, video games, and development environments. With …
including websites, instant messengers, video games, and development environments. With …
Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites
R Amankwah, J Chen, H Song… - Software: Practice and …, 2023 - Wiley Online Library
Previous studies have demonstrated the usefulness of employing automated static analysis
tools (ASAT) and techniques to detect security bugs in software systems. However, these …
tools (ASAT) and techniques to detect security bugs in software systems. However, these …
An empirical comparison of commercial and open‐source web vulnerability scanners
R Amankwah, J Chen, PK Kudjo… - Software: Practice and …, 2020 - Wiley Online Library
Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web
services. Although both commercial and open‐source WVSs exist, their vulnerability …
services. Although both commercial and open‐source WVSs exist, their vulnerability …
Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications
J Cui, L Wang, X Zhao, H Zhang - Computer Communications, 2020 - Elsevier
Abstract Recently, the Internet of Things (IoT) technology is used for several applications for
exchanging information among various devices. The intelligent IoT based system utilizes an …
exchanging information among various devices. The intelligent IoT based system utilizes an …