Automated identification of libraries from vulnerability data
Software Composition Analysis (SCA) has gained traction in recent years with a number of commercial offerings from various companies. SCA involves vulnerability curation process where a group of security researchers, using various data sources, populate a database of open-source library vulnerabilit...
Saved in:
Main Authors: | YANG, Chen, SANTOSA, Andrew, SHARMA, Asankhaya, LO, David |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5501 https://ink.library.smu.edu.sg/context/sis_research/article/6504/viewcontent/Automated_Identification_of_Libraries_from_Vulnerability_Data.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
A machine learning approach for vulnerability curation
by: CHEN, Yang, et al.
Published: (2020) -
Automated identification of libraries from vulnerability data: can we do better?
by: HARYONO, Stefanus A., et al.
Published: (2022) -
To the attention of mobile software developers: Guess what, test your app!
by: CRUZ, Luis C., et al.
Published: (2019) -
Out of sight, out of mind? How vulnerable dependencies affect open-source projects
by: PRANA, Gede Artha Azriadi, et al.
Published: (2021) -
Ensemble-Based Risk Scoring with Extreme Learning Machine for Prediction of Adverse Cardiac Events
by: Liu, Nan, et al.
Published: (2018)