Exploiting library vulnerability via migration-based automated test generation
In software development, developers extensively utilize third-party libraries to avoid implementing existing functionalities. When a new third-party library vulnerability is disclosed, project maintainers need to determine whether their projects are affected by the vulnerability, which requires deve...
Saved in:
Main Authors: | CHEN, Zirui, HU, Xing, XIA, Xin, GAO, Yi, XU, Tongtong, LO, David, YANG, Xiaohu |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2024
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9253 https://ink.library.smu.edu.sg/context/sis_research/article/10253/viewcontent/2312.09564v1.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Test mimicry to assess the exploitability of library vulnerabilities
by: KANG, Hong Jin, et al.
Published: (2022) -
Regression tests to expose change interaction errors
by: Böhme, M., et al.
Published: (2014) -
Search-driven string constraint solving for vulnerability detection
by: THOME, Julian, et al.
Published: (2017) -
Automated identification of libraries from vulnerability data: can we do better?
by: HARYONO, Stefanus A., et al.
Published: (2022) -
Finding real world software vulnerabilities using ChatGPT
by: Wong, Sean Chun Foh
Published: (2024)