This paper presents an approach based on machine learning to predict which components of a software application contain security vulnerabilities. The approach is based on text mining the source code of the components. Namely, each component is characterized as a series of terms contained in its source code, with the associated frequencies. These features are used to forecast whether each component is likely to contain vulnerabilities. In an exploratory validation with 20 Android applications, we discovered that a dependable prediction model can be built. Such model could be useful to prioritize the validation activities, e.g., to identify the components needing special scrutiny.status: publishe
Managing the vulnerabilities reported by a number of security scanning software is a tedious and tim...
Where do most vulnerabilities occur in software? Our Vul-ture tool automatically mines existing vuln...
Ensuring the security of Android applications is a vital and intricate aspect requiring careful cons...
This paper presents an approach based on machine learning to predict which components of a software ...
Early identification of software vulnerabilities is essential in software engineering and can help r...
Software security is a very important aspect for software development organizations who wish to prov...
As the role of information and communication technologies gradually increases in our lives, software...
IEEE Code flaws or vulnerabilities are prevalent in software systems and can potentially cause a var...
Web applications have been gaining increased popularity around the globe, in such a way that a growi...
Mobile application developers sometimes might not be serious about source code security and publish ...
Although automatically finding software vulnerabilities is an important problem, existing code analy...
Software security being one of the primary concerns in the software engineering community, researche...
Being software security one of the primary concerns in the software engineering community, researche...
As software is produced more and more every year, software also gets exploited more. This exploitati...
The number of security failure discovered and disclosed publicly are increasing at a pace like never...
Managing the vulnerabilities reported by a number of security scanning software is a tedious and tim...
Where do most vulnerabilities occur in software? Our Vul-ture tool automatically mines existing vuln...
Ensuring the security of Android applications is a vital and intricate aspect requiring careful cons...
This paper presents an approach based on machine learning to predict which components of a software ...
Early identification of software vulnerabilities is essential in software engineering and can help r...
Software security is a very important aspect for software development organizations who wish to prov...
As the role of information and communication technologies gradually increases in our lives, software...
IEEE Code flaws or vulnerabilities are prevalent in software systems and can potentially cause a var...
Web applications have been gaining increased popularity around the globe, in such a way that a growi...
Mobile application developers sometimes might not be serious about source code security and publish ...
Although automatically finding software vulnerabilities is an important problem, existing code analy...
Software security being one of the primary concerns in the software engineering community, researche...
Being software security one of the primary concerns in the software engineering community, researche...
As software is produced more and more every year, software also gets exploited more. This exploitati...
The number of security failure discovered and disclosed publicly are increasing at a pace like never...
Managing the vulnerabilities reported by a number of security scanning software is a tedious and tim...
Where do most vulnerabilities occur in software? Our Vul-ture tool automatically mines existing vuln...
Ensuring the security of Android applications is a vital and intricate aspect requiring careful cons...