Author:
Du Chaoben,Bai Wanrong,Zhang Lei,Wang Di,Liu Dongqing
Publisher
Springer Nature Singapore
Reference17 articles.
1. Li, Y., Huang, C., Wang, Z., Yuan, L., Xiaochuan, W.: Survey of software vulnerability mining methods based on machine learning. J. Softw. 31(7), 2040–2061 (2020)
2. Flawfinder software official website (2001). https://dwheeler.com/flawfinder/
3. Shahriar, H., Zulkernine, M.: Mitigating program security vulnerabilities: approaches and challenges. ACM Comput. Surv.-CSUR 44, 1–46 (2012). https://doi.org/10.1145/2187671.2187673
4. Baset, A.Z., Denning, T.: Ide plugins for detecting input-validation vulnerabilities (2017). https://doi.org/10.1109/SPW.2017.37
5. Walden, J., Doyle, M.: Savi: static-analysis vulnerability indicator. IEEE Secur. Priv. 10(3), 32–39 (2012). https://doi.org/10.1109/MSP.2012.1