Search Results - (java OR jana) code vulnerabilities
-
1
Java Source Code Vulnerability Detection Using Large Language Model
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2025Published in Procedia computer science (2025)“…) has shown promising performance compared to static code analysis and machine learning with neural architecture in vulnerability detection…”
Get full text
Journal Article -
2
Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java Code
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2024Published in IEEE access (2024)“…Various static code analysis tools have been designed to automatically detect software faults and security vulnerabilities…”
Get full text
Journal Article -
3
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.02.2023Published in IEEE transactions on software engineering (01.02.2023)“…Several studies showed that misuses of cryptographic APIs are common in real-world code (e.g…”
Get full text
Journal Article -
4
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction
ISSN: 2045-2322, 2045-2322Published: London Nature Publishing Group UK 28.03.2024Published in Scientific reports (28.03.2024)“… This study presents a novel deep learning-based vulnerability detection system for Java code…”
Get full text
Journal Article -
5
Enhancing Java Web Application Security: Injection Vulnerability Detection via Interprocedural Analysis and Deep Learning
ISSN: 0018-9529, 1558-1721Published: New York IEEE 01.09.2025Published in IEEE transactions on reliability (01.09.2025)“…Injection attacks exploit vulnerabilities in how applications handle user input, allowing malicious code to infiltrate the execution environment of web applications, leading to severe consequences…”
Get full text
Journal Article -
6
Vulnerability Root Cause Function Locating For Java Vulnerabilities
ISSN: 2574-1934Published: ACM 14.04.2024Published in Proceedings (IEEE/ACM International Conference on Software Engineering Companion. Online) (14.04.2024)“… Reachability analysis has been increasingly leveraged to streamline vulnerability remediation procedures by prioritizing reachable vulnerabilities, which require the code-level root cause…”
Get full text
Conference Proceeding -
7
Detecting code vulnerabilities with heterogeneous GNN training: Detecting code vulnerabilities with heterogeneous GNN training
ISSN: 1615-5262, 1615-5270Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2025Published in International journal of information security (01.10.2025)“…Detecting vulnerabilities in source code is a critical task for software security assurance…”
Get full text
Journal Article -
8
APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities
ISSN: 1382-3256, 1573-7616Published: New York Springer US 01.02.2024Published in Empirical software engineering : an international journal (01.02.2024)“… In particular, we investigate their ability to generate patches for 79 real-world Java vulnerabilities in the Vul4J dataset, as well as the level of trustworthiness of these patches…”
Get full text
Journal Article -
9
Study of JavaScript Static Analysis Tools for Vulnerability Detection in Node.js Packages
ISSN: 0018-9529, 1558-1721Published: New York IEEE 01.12.2023Published in IEEE transactions on reliability (01.12.2023)“… In this article, we present the first empirical study of static code analysis tools for detecting vulnerabilities in Node.js code…”
Get full text
Journal Article -
10
Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities
ISSN: 2158-3927Published: IEEE 01.06.2023Published in Proceedings - International Conference on Dependable Systems and Networks (01.06.2023)“… However, the features may also allow the attackers to construct gadget chains and lead to Java deserialization vulnerabilities…”
Get full text
Conference Proceeding -
11
VulKiller: Java Web Vulnerability Detection with Code Property Graph and Large Language Models
ISSN: 2379-190XPublished: IEEE 06.04.2025Published in Proceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998) (06.04.2025)“…In recent years, web application development has become more efficient, yet vulnerabilities still pose significant risks…”
Get full text
Conference Proceeding -
12
LiteCobra: Enhancing Java Deserialization Vulnerability Detection with Call Graph Pruning
ISSN: 1938-1883Published: IEEE 08.06.2025Published in IEEE International Conference on Communications (2003) (08.06.2025)“…Java deserialization vulnerabilities have become a critical security threat, challenging to detect and even harder to exploit due to deserialization's flexible and customizable nature…”
Get full text
Conference Proceeding -
13
ISVSF: Intelligent Vulnerability Detection Against Java via Sentence-Level Pattern Exploring
ISSN: 1932-8184, 1937-9234Published: New York IEEE 01.03.2022Published in IEEE systems journal (01.03.2022)“… In addition, it is noticed that most code vulnerability detection methods focused on C/C++, and little work can be found on Java…”
Get full text
Journal Article -
14
Secure coding practices in Java: challenges and vulnerabilities
ISBN: 9781450356381, 1450356389ISSN: 1558-1225Published: New York, NY, USA ACM 27.05.2018Published in 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27.05.2018)“…The Java platform and its third-party libraries provide useful features to facilitate secure coding…”
Get full text
Conference Proceeding -
15
Deep Forest and Pruned Syntax Tree-Based Classification Method for Java Code Vulnerability
ISSN: 2227-7390, 2227-7390Published: Basel MDPI AG 01.01.2023Published in Mathematics (Basel) (01.01.2023)“…) for Java code vulnerability. First, the breadth-first…”
Get full text
Journal Article -
16
Multi-Granularity Detector for Vulnerability Fixes
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.08.2023Published in IEEE transactions on software engineering (01.08.2023)“… Moreover, code changes can be noisy and difficult to analyze. We observe that noise can occur at different levels of detail, making it challenging to detect vulnerability fixes accurately…”
Get full text
Journal Article -
17
A Comparative Study of Static Code Analysis tools for Vulnerability Detection in C/C++ and JAVA Source Code
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2020Published in Procedia computer science (2020)“… To ensure software security, one of the major task is to identify vulnerabilities present in the source code before the software is being deployed…”
Get full text
Journal Article -
18
Finetuning Large Language Models for Vulnerability Detection
ISSN: 2169-3536, 2169-3536Published: IEEE 2025Published in IEEE access (2025)“…This paper presents the results of finetuning large language models (LLMs) for the task of detecting vulnerabilities in Java source code…”
Get full text
Journal Article -
19
AndroCom: A Real-World Android Applications’ Vulnerability Dataset to Assist with Automatically Detecting Vulnerabilities
ISSN: 2076-3417, 2076-3417Published: Basel MDPI AG 01.03.2025Published in Applied sciences (01.03.2025)“… Our research constructs a vulnerability dataset for Android application source code, primarily based on the Common Vulnerabilities and Exposures (CVE…”
Get full text
Journal Article -
20
VulFinder: Exploring Chaincode Vulnerabilities More Effectively and Efficiently Using Knowledge Graph Based Defect Pattern Matching
ISSN: 0098-5589, 1939-3520Published: New York IEEE 2025Published in IEEE transactions on software engineering (2025)“… Although there are some vulnerability detection methods for Java and Node.js, there are very few vulnerability detection methods for Go, especially when it is used as a smart contract programming language in Hyperledger Fabric…”
Get full text
Journal Article

