Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application.
Sarah ElderNusrat ZahanRui ShuMonica MetroValeri KozarevTim MenziesLaurie A. WilliamsPublished in: CoRR (2022)
Keyphrases
- case study
- open source
- real world
- object detection
- detection algorithm
- java applets
- software development
- decision support
- security vulnerabilities
- automatic detection
- false alarms
- detection accuracy
- java programs
- computer systems
- attack graphs
- buffer overflow
- cross platform
- database
- programming language
- web services
- data sets