[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?

F Lomio, E Iannone, A De Lucia, F Palomba… - Journal of Systems and …, 2022 - Elsevier
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …

A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners

S Alazmi, DC De Leon - IEEE Access, 2022 - ieeexplore.ieee.org
Web applications have been a significant target for successful security breaches in the last
few years. They are currently secured, as a primary method, by searching for their …

{PentestGPT}: Evaluating and harnessing large language models for automated penetration testing

G Deng, Y Liu, V Mayoral-Vilches, P Liu, Y Li… - 33rd USENIX Security …, 2024 - usenix.org
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally
resisted automation due to the extensive expertise required by human professionals. Large …

Pentestgpt: An llm-empowered automatic penetration testing tool

G Deng, Y Liu, V Mayoral-Vilches, P Liu, Y Li… - arxiv preprint arxiv …, 2023 - arxiv.org
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally
resisted automation due to the extensive expertise required by human professionals. Large …

An algorithm for detecting SQL injection vulnerability using black-box testing

MS Aliero, I Ghani, KN Qureshi, MF Rohani - Journal of Ambient …, 2020 - Springer
Abstract SQL Injection Attack (SQLIA) is one of the most severe attack that can be used
against web database-driven applications. Attackers use SQLIA to obtain unauthorized …

An overview of vulnerability assessment and penetration testing techniques

S Shah, BM Mehtre - Journal of Computer Virology and Hacking …, 2015 - Springer
All Internet facing systems and applications carry security risks. Security professionals
across the globe generally address these security risks by Vulnerability Assessment and …

Saphire: Sandboxing {PHP} applications with tailored system call allowlists

A Bulekov, R Jahanshahi, M Egele - 30th USENIX Security Symposium …, 2021 - usenix.org
Interpreted languages, such as PHP, power a host of platform-independent applications,
including websites, instant messengers, video games, and development environments. With …

Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites

R Amankwah, J Chen, H Song… - Software: Practice and …, 2023 - Wiley Online Library
Previous studies have demonstrated the usefulness of employing automated static analysis
tools (ASAT) and techniques to detect security bugs in software systems. However, these …

An empirical comparison of commercial and open‐source web vulnerability scanners

R Amankwah, J Chen, PK Kudjo… - Software: Practice and …, 2020 - Wiley Online Library
Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web
services. Although both commercial and open‐source WVSs exist, their vulnerability …

Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications

J Cui, L Wang, X Zhao, H Zhang - Computer Communications, 2020 - Elsevier
Abstract Recently, the Internet of Things (IoT) technology is used for several applications for
exchanging information among various devices. The intelligent IoT based system utilizes an …