3260 papers • 126 benchmarks • 313 datasets
Vulnerability detection plays a crucial role in safeguarding against these threats by identifying weaknesses and potential entry points that malicious actors could exploit. Through advanced scanning techniques and penetration testing, vulnerability detection tools meticulously analyze web applications and websites for vulnerabilities such as SQL injection, cross-site scripting (XSS), and insecure authentication mechanisms. By proactively identifying and addressing vulnerabilities, organizations can strengthen their online security posture and mitigate the risk of data breaches, financial loss, and reputational damage. Additionally, vulnerability detection empowers businesses to stay compliant with industry regulations and standards, demonstrating their commitment to safeguarding sensitive information and maintaining the trust of their customers. With the evolving threat landscape and increasingly sophisticated attack vectors, investing in robust vulnerability detection measures is paramount for staying one step ahead of cyber threats and ensuring the resilience of web-based platforms and services.
(Image credit: Papersgraph)
These leaderboards are used to track progress in vulnerability-detection-1
No benchmarks available.
Use these libraries to find vulnerability-detection-1 models and implementations
No subtasks available.
The study of using deep learning-based vulnerability detection to relieve human experts from the tedious and subjective task of manually defining features and Experimental results show that VulDeePecker can achieve much fewer false negatives and reasonable false positives than other approaches.
This work proposes the first systematic framework for using deep learning to detect vulnerabilities in C/C++ programs with source code, and focuses on obtaining program representations that can accommodate syntax and semantic information pertinent to vulnerabilities.
This work leveraged the wealth of C and C++ open-source code available to develop a largescale function-level vulnerability detection system using machine learning and demonstrates that deep feature representation learning on source code is a promising approach for automated software vulnerability detection.
This paper proposes SAFE, a novel architecture for the embedding of functions based on a self-attentive neural network that works directly on disassembled binary functions, does not require manual feature extraction, is computationally more efficient than existing solutions, and is more general as it works on stripped binaries and on multiple architectures.
It is argued, that existing vulnerability databases are of insufficient information density and show some biased content with respect to vulnerabilities in robots and the Robot Vulnerability Database (RVD), a directory for responsible disclosure of bugs, weaknesses and vulnerabilities in Robots is presented.
This paper focuses on building a hybrid approach of static and dynamic analysis for detecting the vulnerabilities of Android applications, and detects information leaks as well as insecure network requests alongside other commonly detected flaws that harm users’ privacy.
Trex is presented, a transfer-learning-based framework, to automate learning execution semantics explicitly from functions' micro-traces and transfer the learned knowledge to match semantically similar functions.
The results show that the architecture is able to capture subtle stack-based buffer overflow vulnerabilities that strongly depend on the context, thus suggesting that this approach may be extended to real-world setting, as well as to other forms of vulnerability detection.
Eth2Vec, a machine-learning-based static analysis tool for vulnerability detection in smart contracts, is proposed, which is also robust against code rewrites, i.e., it can detect vulnerabilities even in rewritten codes.
This paper applies feedforward networks with some preprocessing to two analytics tasks: issue close time prediction, and vulnerability detection, and test the hypothesis laid by Galke and Scherp, that feed forward networks suffice for many analytics tasks (which it is called, the"Old but Gold"hypothesis) for these two tasks.
Adding a benchmark result helps the community track progress.