There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability Detection.
Jinghua GroppeSven GroppeDaniel SenfRalf MöllerPublished in: Inf. (2024)
Keyphrases
- np hard
- np complete
- decision problems
- software systems
- data sets
- detection method
- case study
- detection rate
- source code
- automatic detection
- software architecture
- anomaly detection
- software evolution
- program understanding
- false alarms
- software projects
- hardware description language
- development process
- false positives
- detection algorithm
- computer systems
- optimization problems
- information systems