نتایج جستجو برای: vulnerability detection

تعداد نتایج: 606748  

Journal: :PIK - Praxis der Informationsverarbeitung und Kommunikation 2004

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2015

Journal: :International Journal of Advanced Computer Science and Applications 2022

Software vulnerability detection is one of the key tasks in field software security. Detecting source code advance can effectively prevent malicious attacks. Traditional methods are often ineffective and inefficient when dealing with large amounts code. In this paper, we present BBVD approach, which treats high-level programming languages as another natural language uses BERT-based models proce...

Journal: :International Journal of Engineering & Technology 2018

2018
Jacob A. Harer Louis Y. Kim Rebecca L. Russell Onur Ozdemir Leonard R. Kosta Akshay Rangamani Lei H. Hamilton Gabriel I. Centeno Jonathan R. Key Paul M. Ellingwood Marc W. McConley Jeffrey M. Opper Peter Chin Tomo Lazovich

Thousands of security vulnerabilities are discovered in production software each year, either reported publicly to the Common Vulnerabilities and Exposures database or discovered internally in proprietary code. Vulnerabilities often manifest themselves in subtle ways that are not obvious to code reviewers or the developers themselves. With the wealth of open source code available for analysis, ...

2009
Willy Jimenez Amel Mammar Ana Cavalli

Software is a common component of the devices or systems that form part of our actual life. These systems are usually complex and are developed by different programmers. Usually programmers make mistakes in the code which could generate software vulnerabilities. A software vulnerability is a flaw or defect in the software construction that can be exploited by an attacker in order to obtain some...

2012
Saurabh Jain Deepak Singh Tomar Divya Rishi Sahu

These days, most of companies expanding their business horizon through dynamic web sites based on Web 2.0 concept. The JavaScript is a key choice of web developers to build sophisticated dynamic web 2.0 application such social network site, blogs, e-commerce websites. On the other hand vulnerable JavaScript code is also exploited by the hackers to launch the attacks. Hacker may tamper the JavaS...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید