Automated identification of libraries from vulnerability data

Software Composition Analysis (SCA) has gained traction in recent years with a number of commercial offerings from various companies. SCA involves vulnerability curation process where a group of security researchers, using various data sources, populate a database of open-source library vulnerabilit...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Chen, SANTOSA, Andrew, SHARMA, Asankhaya, LO, David
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5501
https://ink.library.smu.edu.sg/context/sis_research/article/6504/viewcontent/Automated_Identification_of_Libraries_from_Vulnerability_Data.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Be the first to leave a comment!
You must be logged in first