Automated identification of libraries from vulnerability data: can we do better?
Software engineers depend heavily on software libraries and have to update their dependencies once vulnerabilities are found in them. Software Composition Analysis (SCA) helps developers identify vulnerable libraries used by an application. A key challenge is the identification of libraries related...
Saved in:
Main Authors: | HARYONO, Stefanus A., KANG, Hong Jin, SHARMA, Abhishek, SHARMA, Asankhaya, SANTOSA, Andrew E., ANG, Ming Yi, LO, David |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2022
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7690 https://ink.library.smu.edu.sg/context/sis_research/article/8693/viewcontent/automated.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
CHRONOS: Time-aware zero-shot identification of libraries from vulnerability reports
by: LYU, Yunbo, et al.
Published: (2023) -
Automated identification of libraries from vulnerability data
by: YANG, Chen, et al.
Published: (2020) -
HERMES: using commit-issue linking to detect vulnerability-fixing commits
by: NGUYEN, Truong Giang, et al.
Published: (2022) -
Exploiting library vulnerability via migration-based automated test generation
by: CHEN, Zirui, et al.
Published: (2024) -
Automated pre-processing of a shrinkwrap label
by: Lim, Phyllis L., et al.
Published: (2007)