Movatterモバイル変換


[0]ホーム

URL:


Amankwah et al., 2020 - Google Patents

Fast bug detection algorithm for identifying potential vulnerabilities in juliet test cases

Amankwah et al., 2020

Document ID
13817349573000432081
Author
Amankwah R
Chen J
Amponsah A
Kudjo P
Ocran V
Anang C
Publication year
Publication venue
2020 IEEE 8th International Conference on Smart City and Informatization (iSCI)

External Links

Snippet

Automated static analysis tools (ASATs) are one of the most widely used and effective ways of detecting bugs in Java code. ASATs helps to improve the security of software by detecting potential violations without executing the application. We have explored the existing …
Continue reading atieeexplore.ieee.org (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6228Selecting the most significant subset of features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks

Similar Documents

PublicationPublication DateTitle
Jeong et al.Improving bug triage with bug tossing graphs
Podgurski et al.Automated support for classifying software failure reports
CN117951701A (en)Method for determining flaws and vulnerabilities in software code
Steidl et al.Feature-based detection of bugs in clones
US8006138B2 (en)Software quality assessment based on semantic similarities
Reger et al.A pattern-based approach to parametric specification mining
CN112464237B (en)Static code security diagnosis method and device
US20250016185A1 (en)Apparatus and method for automatically analyzing malicious event log
CN111338692B (en) Vulnerability classification method, device and electronic device based on vulnerability code
Sotgiu et al.Explainability-based debugging of machine learning for vulnerability discovery
Falessi et al.The impact of dormant defects on defect prediction: A study of 19 apache projects
Gove et al.Identifying infeasible GUI test cases using support vector machines and induced grammars
Davari et al.An automatic software vulnerability classification framework
Gesi et al.An empirical examination of the impact of bias on just-in-time defect prediction
Tosun et al.Ensemble of software defect predictors: a case study
Amankwah et al.Fast bug detection algorithm for identifying potential vulnerabilities in juliet test cases
CN112783513B (en)Code risk checking method, device and equipment
CN116108453A (en)Logical vulnerability detection method, device, equipment and storage medium
Rajan et al.Knowledge-based consistency testing of large language models
Cai et al.Programming assistant for exception handling with codebert
Zahan et al.Leveraging large language models to detect npm malicious packages
Dubniczky et al.Castle: Benchmarking dataset for static code analyzers and llms towards cwe detection
Fischer et al.Predicting higher order structural feature interactions in variable systems
CN109145609A (en)A kind of data processing method and device
Lee et al.A multi-reasoner, justification-based approach to reasoner correctness

[8]
ページ先頭

©2009-2025 Movatter.jp