This thesis looks into automatic detection of security related code in order to eliminate this problem. Since manual code detection is tiresome and introduces human error we need a more efficient way of doing it. We explore code detection by using software architecture and code metrics to extract information about the code and then using this information with machine learning algorithms. By extracting code metrics and combining them with Wirfs-Brocks class roles we show that it is possible to detect security related code. We conclude that in order to achieve much better detection accuracy we need to use different kind of methods. This could be software architecture pattern detection to extract additional information
Hidden functionality in software is a big problem, because we cannot be sure that the software does ...
Intrusion detection systems, traditionally based on signatures, have not escaped the recent appeal o...
Abstract—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions,...
Abstract — Over the past few years, a new computer security problem has arisen, malwares and spyware...
The awareness of writing secure code rises with the increasing number of attacks and their resultant...
Bad smells of code can lead to significant software vulnerabilities that negatively affect the secur...
ABSTRACT\ud AN INVESTIGATION OF MACHINE LEARNING TECHNIQUES FOR\ud THE DETECTION OF UNKNOWN MALICIOU...
Although automatically finding software vulnerabilities is an important problem, existing code analy...
Adware represents a possible threat to the security and privacy of computer users. Traditional signa...
Vulnerable source code in software applications is causing paramount reliability and security issues...
Software metrics are widely-used indicators of software quality and several studies have shown that...
Abstract — Software architecture degradation is a long-standing problem in software engineering. Pre...
Scareware is a recent type of malicious software that may pose financial and privacy-related threats...
Spyware represents a serious threat to confidentiality since it may result in loss of control over p...
Hidden functionality in software is a big problem, because we cannot be sure that the software does ...
Hidden functionality in software is a big problem, because we cannot be sure that the software does ...
Intrusion detection systems, traditionally based on signatures, have not escaped the recent appeal o...
Abstract—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions,...
Abstract — Over the past few years, a new computer security problem has arisen, malwares and spyware...
The awareness of writing secure code rises with the increasing number of attacks and their resultant...
Bad smells of code can lead to significant software vulnerabilities that negatively affect the secur...
ABSTRACT\ud AN INVESTIGATION OF MACHINE LEARNING TECHNIQUES FOR\ud THE DETECTION OF UNKNOWN MALICIOU...
Although automatically finding software vulnerabilities is an important problem, existing code analy...
Adware represents a possible threat to the security and privacy of computer users. Traditional signa...
Vulnerable source code in software applications is causing paramount reliability and security issues...
Software metrics are widely-used indicators of software quality and several studies have shown that...
Abstract — Software architecture degradation is a long-standing problem in software engineering. Pre...
Scareware is a recent type of malicious software that may pose financial and privacy-related threats...
Spyware represents a serious threat to confidentiality since it may result in loss of control over p...
Hidden functionality in software is a big problem, because we cannot be sure that the software does ...
Hidden functionality in software is a big problem, because we cannot be sure that the software does ...
Intrusion detection systems, traditionally based on signatures, have not escaped the recent appeal o...
Abstract—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions,...