Abstract:To address security vulnerabilities arising from third-party libraries, security researchers maintain databases monitoring and curating vulnerability reports. Application developers can identify vulnerable libraries by directly querying the databases with their used libraries. However, the querying results of vulnerable libraries are not reliable due to the incompleteness of vulnerability reports. Thus, current approaches model the task of identifying vulnerable libraries as
Read more
Tags: application, reports, Java Libraries, vulnerabilities, Java, Updated, CR, application developers, monitoring, security, arxiv, researchers, databases, and, Vulnerability
Related Posts
- VFCFinder: Seamlessly Pairing Security Advisories and Patches. (arXiv:2311.01532v1 [cs.CR])a
- Towards Stronger Blockchains: Security Against Front-Running Attacks. (arXiv:2311.10253v1 [cs.CR])a
- smart contract, security, vulnerabilities, attacks, defenses. (arXiv:2311.00270v1 [cs.CR])a
- Perfectly Secure Steganography Using Minimum Entropy Coupling. (arXiv:2210.14889v4 [cs.CR] UPDATED)a
- Perfectly Secure Steganography Using Minimum Entropy Coupling. (arXiv:2210.14889v4 [cs.CR] UPDATED)a