Výsledky vyhledávání - java code vulnerabilities
-
1
Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java Code
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2024Vydáno v IEEE access (2024)“…Various static code analysis tools have been designed to automatically detect software faults and security vulnerabilities…”
Získat plný text
Journal Article -
2
Deep Forest and Pruned Syntax Tree-Based Classification Method for Java Code Vulnerability
ISSN: 2227-7390, 2227-7390Vydáno: Basel MDPI AG 01.01.2023Vydáno v Mathematics (Basel) (01.01.2023)“…) for Java code vulnerability. First, the breadth-first…”
Získat plný text
Journal Article -
3
Java Source Code Vulnerability Detection Using Large Language Model
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2025Vydáno v Procedia computer science (2025)“…) has shown promising performance compared to static code analysis and machine learning with neural architecture in vulnerability detection…”
Získat plný text
Journal Article -
4
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction
ISSN: 2045-2322, 2045-2322Vydáno: London Nature Publishing Group UK 28.03.2024Vydáno v Scientific reports (28.03.2024)“… This study presents a novel deep learning-based vulnerability detection system for Java code…”
Získat plný text
Journal Article -
5
A Comparative Study of Static Code Analysis tools for Vulnerability Detection in C/C++ and JAVA Source Code
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2020Vydáno v Procedia computer science (2020)“… To ensure software security, one of the major task is to identify vulnerabilities present in the source code before the software is being deployed…”
Získat plný text
Journal Article -
6
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
ISSN: 1558-058XVydáno: IEEE 01.04.2018Vydáno v SoutheastCon 2018 (01.04.2018)“… problems. Other methods of finding software vulnerabilities automatically are required. This proof-of-concept study applied natural language processing on Java byte code to locate…”
Získat plný text
Konferenční příspěvek -
7
VulKiller: Java Web Vulnerability Detection with Code Property Graph and Large Language Models
ISSN: 2379-190XVydáno: IEEE 06.04.2025Vydáno v Proceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998) (06.04.2025)“…In recent years, web application development has become more efficient, yet vulnerabilities still pose significant risks…”
Získat plný text
Konferenční příspěvek -
8
Research on JAVA Source Code Vulnerability Detection Device Design
ISSN: 2693-289XVydáno: IEEE 15.09.2023Vydáno v IEEE ... Information Technology and Mechatronics Engineering Conference (ITOEC ... ) (Online) (15.09.2023)“… This article focuses on optimizing the detection method combining static tool scanning and manual auditing, and designs a JAVA source code vulnerability detection device…”
Získat plný text
Konferenční příspěvek -
9
Contextual Profiling of Stack Overflow Java Code Security Vulnerabilities Initial Insights from a Pilot Study
ISSN: 2693-9371Vydáno: IEEE 01.12.2021Vydáno v IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) (Online) (01.12.2021)“… Researchers have thus studied Stack Overflow code snippet quality, with particular focus on security issues…”
Získat plný text
Konferenční příspěvek -
10
Statically Scanning Java Code: Finding Security Vulnerabilities
ISSN: 0740-7459, 1937-4194Vydáno: Los Alamitos IEEE 01.09.2000Vydáno v IEEE software (01.09.2000)“…Developers and users require some degree of assurance in their applications' security vulnerabilities…”
Získat plný text
Journal Article -
11
Blind Auditing Security Testing Blind Auditing of Web Vulnerabilities in Encrypted Javascript Code Repository
ISBN: 9798297968561Vydáno: ProQuest Dissertations & Theses 01.01.2024“… A new approach is essential to pinpoint vulnerabilities while maintaining the privacy and security of the code…”
Získat plný text
Dissertation -
12
A Method to Detect Vulnerability of Java Source Code based on AST and Graph Attention Networks
Vydáno: IEEE 16.08.2024Vydáno v 2024 14th International Conference on Software Technology and Engineering (ICSTE) (16.08.2024)“…It is crucial to Detecting vulnerabilities in source code at the beginning of projects…”
Získat plný text
Konferenční příspěvek -
13
Example-Based Vulnerability Detection and Repair in Java Code
ISSN: 2643-7171Vydáno: ACM 01.05.2022Vydáno v 2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC) (01.05.2022)“… When developers misuse some of the APIs, their code becomes vulnerable to cyber-attacks. To eliminate such vulnerabilities, people built tools to detect security-API misuses via pattern matching…”
Získat plný text
Konferenční příspěvek -
14
Project Achilles: A Prototype Tool for Static Method-Level Vulnerability Detection of Java Source Code Using a Recurrent Neural Network
Vydáno: IEEE 01.11.2019Vydáno v 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW) (01.11.2019)“… Using the National Institute of Standards and Technology's Juliet Java Suite, containing thousands of examples of defective Java methods for a variety of vulnerabilities, a prototype tool…”
Získat plný text
Konferenční příspěvek -
15
Automatic Repair of Java Code with Timing Side-Channel Vulnerabilities
Vydáno: IEEE 01.11.2021Vydáno v 2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW) (01.11.2021)“… In this paper, we propose DifFuzzAR, a new tool for automatic repair of timing side-channel vulnerabilities in Java code…”
Získat plný text
Konferenční příspěvek -
16
DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring
ISSN: 0928-8910, 1573-7535Vydáno: New York Springer US 01.06.2024Vydáno v Automated software engineering (01.06.2024)“… In this paper, we propose DifFuzzAR, a tool for automatic repair of timing side-channel vulnerabilities in Java code…”
Získat plný text
Journal Article -
17
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities
ISSN: 2331-8422Vydáno: Ithaca Cornell University Library, arXiv.org 17.08.2022Vydáno v arXiv.org (17.08.2022)“…, can be dangerous since it can open the application to attacks such as remote code execution (RCE) if the data to deserialize is originating from an untrusted source…”
Získat plný text
Paper -
18
SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN
Vydáno: IEEE 01.01.2018Vydáno v 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (01.01.2018)“…) that senses and avoids an execution of JavaScript code injection vulnerabilities on Online Social Network (OSN…”
Získat plný text
Konferenční příspěvek -
19
Vulnerable JavaScript functions detection using stacking of convolutional neural networks
ISSN: 2376-5992, 2376-5992Vydáno: United States PeerJ. Ltd 29.02.2024Vydáno v PeerJ. Computer science (29.02.2024)“… These models use vulnerable information and code features to detect related vulnerable code. For identifying different vulnerabilities in JavaScript functions, an approach…”
Získat plný text
Journal Article -
20
Using software metrics for predicting vulnerable classes and methods in Java projects: A machine learning approach
ISSN: 2047-7473, 2047-7481Vydáno: Chichester Wiley Subscription Services, Inc 01.03.2021Vydáno v Journal of software : evolution and process (01.03.2021)“…[Context]A software vulnerability becomes harmful for software when an attacker successfully exploits the insecure code and reveals the vulnerability…”
Získat plný text
Journal Article

