Identifying Vulnerable Functions from Source Code using Vulnerability Reports.
Rabaya Sultana MimToukir AhammedKazi SakibPublished in: IWESQ/QuASoQ@APSEC (2023)
Keyphrases
- source code
- open source
- software systems
- open source software
- software maintenance
- static analysis
- software projects
- linux kernel
- high level
- legacy systems
- manual inspection
- mining software repositories
- plagiarism detection
- program understanding
- software repositories
- text files
- object oriented systems
- reverse engineer
- software evolution
- software engineers
- mailing lists
- change impact analysis
- free software
- version control
- historical information