Search Results - java code vulnerabilities~

Refine Results
  1. 1

    Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java Code by Alqaradaghi, Midya, Kozsik, Tamas

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2024
    Published in IEEE access (2024)
    “…Various static code analysis tools have been designed to automatically detect software faults and security vulnerabilities…”
    Get full text
    Journal Article
  2. 2

    Deep Forest and Pruned Syntax Tree-Based Classification Method for Java Code Vulnerability by Ding, Jiaman, Fu, Weikang, Jia, Lianyin

    ISSN: 2227-7390, 2227-7390
    Published: Basel MDPI AG 01.01.2023
    Published in Mathematics (Basel) (01.01.2023)
    “…) for Java code vulnerability. First, the breadth-first…”
    Get full text
    Journal Article
  3. 3

    Java Source Code Vulnerability Detection Using Large Language Model by Anbiya, Dhika Rizki, Ferdinan, Teddy, Kołaczek, Grzegorz

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2025
    Published in Procedia computer science (2025)
    “…) has shown promising performance compared to static code analysis and machine learning with neural architecture in vulnerability detection…”
    Get full text
    Journal Article
  4. 4

    Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction by Hussain, Shumaila, Nadeem, Muhammad, Baber, Junaid, Hamdi, Mohammed, Rajab, Adel, Al Reshan, Mana Saleh, Shaikh, Asadullah

    ISSN: 2045-2322, 2045-2322
    Published: London Nature Publishing Group UK 28.03.2024
    Published in Scientific reports (28.03.2024)
    “… This study presents a novel deep learning-based vulnerability detection system for Java code…”
    Get full text
    Journal Article
  5. 5

    A Comparative Study of Static Code Analysis tools for Vulnerability Detection in C/C++ and JAVA Source Code by Kaur, Arvinder, Nayyar, Ruchikaa

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2020
    Published in Procedia computer science (2020)
    “… To ensure software security, one of the major task is to identify vulnerabilities present in the source code before the software is being deployed…”
    Get full text
    Journal Article
  6. 6

    Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques by Jackson, Kevin A., Bennett, Brian T.

    ISSN: 1558-058X
    Published: IEEE 01.04.2018
    Published in SoutheastCon 2018 (01.04.2018)
    “… problems. Other methods of finding software vulnerabilities automatically are required. This proof-of-concept study applied natural language processing on Java byte code to locate…”
    Get full text
    Conference Proceeding
  7. 7

    VulKiller: Java Web Vulnerability Detection with Code Property Graph and Large Language Models by Chen, Xingchen, Wang, Baizhu, Zhang, Mengjun, Cao, Yaqin, Liu, Qixu

    ISSN: 2379-190X
    Published: IEEE 06.04.2025
    “…In recent years, web application development has become more efficient, yet vulnerabilities still pose significant risks…”
    Get full text
    Conference Proceeding
  8. 8

    Research on JAVA Source Code Vulnerability Detection Device Design by Li, Min, Sun, Yue, Hou, Cong, Chen, Wei

    ISSN: 2693-289X
    Published: IEEE 15.09.2023
    “… This article focuses on optimizing the detection method combining static tool scanning and manual auditing, and designs a JAVA source code vulnerability detection device…”
    Get full text
    Conference Proceeding
  9. 9

    Contextual Profiling of Stack Overflow Java Code Security Vulnerabilities Initial Insights from a Pilot Study by Licorish, Sherlock A., Nishatharan, Thushika

    ISSN: 2693-9371
    Published: IEEE 01.12.2021
    “… Researchers have thus studied Stack Overflow code snippet quality, with particular focus on security issues…”
    Get full text
    Conference Proceeding
  10. 10

    Statically Scanning Java Code: Finding Security Vulnerabilities by Viega, John, McGraw, Gary, Mutdosch, Tom, Felten, Edward W.

    ISSN: 0740-7459, 1937-4194
    Published: Los Alamitos IEEE 01.09.2000
    Published in IEEE software (01.09.2000)
    “…Developers and users require some degree of assurance in their applications' security vulnerabilities…”
    Get full text
    Journal Article
  11. 11

    Blind Auditing Security Testing Blind Auditing of Web Vulnerabilities in Encrypted Javascript Code Repository by Padrão, João Rodrigues

    ISBN: 9798297968561
    Published: ProQuest Dissertations & Theses 01.01.2024
    “… A new approach is essential to pinpoint vulnerabilities while maintaining the privacy and security of the code…”
    Get full text
    Dissertation
  12. 12

    A Method to Detect Vulnerability of Java Source Code based on AST and Graph Attention Networks by Zhu, Jin, Ge, Hui, Jin, Xiao, Luo, Rui

    Published: IEEE 16.08.2024
    “…It is crucial to Detecting vulnerabilities in source code at the beginning of projects…”
    Get full text
    Conference Proceeding
  13. 13

    Example-Based Vulnerability Detection and Repair in Java Code by Zhang, Ying, Xiao, Ya, Kabir, Md Mahir Asef, Yao, Danfeng, Meng, Na

    ISSN: 2643-7171
    Published: ACM 01.05.2022
    “… When developers misuse some of the APIs, their code becomes vulnerable to cyber-attacks. To eliminate such vulnerabilities, people built tools to detect security-API misuses via pattern matching…”
    Get full text
    Conference Proceeding
  14. 14

    Project Achilles: A Prototype Tool for Static Method-Level Vulnerability Detection of Java Source Code Using a Recurrent Neural Network by Saccente, Nicholas, Dehlinger, Josh, Deng, Lin, Chakraborty, Suranjan, Xiong, Yin

    Published: IEEE 01.11.2019
    “… Using the National Institute of Standards and Technology's Juliet Java Suite, containing thousands of examples of defective Java methods for a variety of vulnerabilities, a prototype tool…”
    Get full text
    Conference Proceeding
  15. 15

    Automatic Repair of Java Code with Timing Side-Channel Vulnerabilities by Lima, Rui, Ferreira, Joao F., Mendes, Alexandra

    Published: IEEE 01.11.2021
    “… In this paper, we propose DifFuzzAR, a new tool for automatic repair of timing side-channel vulnerabilities in Java code…”
    Get full text
    Conference Proceeding
  16. 16

    DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring by Lima, Rui, Ferreira, João F., Mendes, Alexandra, Carreira, Carolina

    ISSN: 0928-8910, 1573-7535
    Published: New York Springer US 01.06.2024
    Published in Automated software engineering (01.06.2024)
    “… In this paper, we propose DifFuzzAR, a tool for automatic repair of timing side-channel vulnerabilities in Java code…”
    Get full text
    Journal Article
  17. 17

    An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities by Sayar, Imen, Bartel, Alexandre, Bodden, Eric, Yves Le Traon

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 17.08.2022
    Published in arXiv.org (17.08.2022)
    “…, can be dangerous since it can open the application to attacks such as remote code execution (RCE) if the data to deserialize is originating from an untrusted source…”
    Get full text
    Paper
  18. 18

    SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN by Gupta, Shashank, Gugta, B. B.

    Published: IEEE 01.01.2018
    “…) that senses and avoids an execution of JavaScript code injection vulnerabilities on Online Social Network (OSN…”
    Get full text
    Conference Proceeding
  19. 19

    Vulnerable JavaScript functions detection using stacking of convolutional neural networks by Sheneamer, Abdullah

    ISSN: 2376-5992, 2376-5992
    Published: United States PeerJ. Ltd 29.02.2024
    Published in PeerJ. Computer science (29.02.2024)
    “… These models use vulnerable information and code features to detect related vulnerable code. For identifying different vulnerabilities in JavaScript functions, an approach…”
    Get full text
    Journal Article
  20. 20

    Using software metrics for predicting vulnerable classes and methods in Java projects: A machine learning approach by Sultana, Kazi Zakia, Anu, Vaibhav, Chong, Tai‐Yin

    ISSN: 2047-7473, 2047-7481
    Published: Chichester Wiley Subscription Services, Inc 01.03.2021
    “…[Context]A software vulnerability becomes harmful for software when an attacker successfully exploits the insecure code and reveals the vulnerability…”
    Get full text
    Journal Article