{"id":661,"date":"2021-08-27T09:08:01","date_gmt":"2021-08-27T09:08:01","guid":{"rendered":"https:\/\/metrics.blogg.gu.se\/?p=661"},"modified":"2021-07-10T09:19:26","modified_gmt":"2021-07-10T09:19:26","slug":"comparing-different-security-vulnerability-detection-techniques-article-review","status":"publish","type":"post","link":"https:\/\/metrics.blogg.gu.se\/?p=661","title":{"rendered":"Comparing different security vulnerability detection techniques (article review)"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"890\" src=\"https:\/\/metrics.blogg.gu.se\/files\/2021\/07\/safe-913452_1920-1024x890.jpg\" alt=\"\" class=\"wp-image-662\" srcset=\"https:\/\/metrics.blogg.gu.se\/files\/2021\/07\/safe-913452_1920-1024x890.jpg 1024w, https:\/\/metrics.blogg.gu.se\/files\/2021\/07\/safe-913452_1920-300x261.jpg 300w, https:\/\/metrics.blogg.gu.se\/files\/2021\/07\/safe-913452_1920-768x667.jpg 768w, https:\/\/metrics.blogg.gu.se\/files\/2021\/07\/safe-913452_1920-1200x1043.jpg 1200w, https:\/\/metrics.blogg.gu.se\/files\/2021\/07\/safe-913452_1920-1320x1147.jpg 1320w, https:\/\/metrics.blogg.gu.se\/files\/2021\/07\/safe-913452_1920.jpg 1920w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>Image by <a href=\"https:\/\/pixabay.com\/users\/8385-8385\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=913452\">Reimund Bertrams<\/a> from <a href=\"https:\/\/pixabay.com\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=913452\">Pixabay<\/a><\/figcaption><\/figure>\n\n\n\n<p><a href=\"https:\/\/arxiv.org\/pdf\/2107.01921.pdf\">An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing (arxiv.org)<\/a><\/p>\n\n\n\n<p class=\"has-drop-cap\">In the recent weeks I&#8217;ve turned into a specific part of my work, i.e. security vulnerability detection. In many areas, working with security has focused on the entire chain. And that&#8217;s a good thing &#8211; we need to understand when and where we have a vulnerability. However, that&#8217;s not what I can help with, which has never really stopped me before. <\/p>\n\n\n\n<p>So, I was looking for more programmatic view on security. To be more exact, I wonted to know what we, as software engineers, need to focus on when it comes to cyber security. We can, naturally, measure it, but that&#8217;s probably not the only thing. We can analyze libraries from OSS communities to find which ones could be exploited. We can even program in a specific way to minimize the risk of the exploitation. <\/p>\n\n\n\n<p>In this paper, the authors compare two different techniques for software vulnerability prediction &#8211; static software analysis and vulnerability prediction models. They have identified 12 different findings, of which the following are the most interesting ones:<\/p>\n\n\n\n<ul><li>SVP models are generally a bit better when it comes to precision and overall preformance.<\/li><li>SVP models provide fewer files to inspect as the output, which saves the cost. <\/li><li>The two approaches lack synergy, and it&#8217;s difficult to use them together to increase their performance. <\/li><\/ul>\n\n\n\n<p>Since they have compared only a few tools, I believe it&#8217;s important to do more experiments. It is also important to understand whether it is good or bad to have fewer files to inspect &#8211; I mean, one undetected vulnerability can be very costly&#8230; <\/p>\n","protected":false},"excerpt":{"rendered":"<p>An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing (arxiv.org) In the recent weeks I&#8217;ve turned into a specific part of my work, i.e. security vulnerability detection. In many areas, working with security has focused on the entire chain. And that&#8217;s a good thing &#8211; we need to understand when and &hellip; <a href=\"https:\/\/metrics.blogg.gu.se\/?p=661\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Comparing different security vulnerability detection techniques (article review)&#8221;<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7],"tags":[],"_links":{"self":[{"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=\/wp\/v2\/posts\/661"}],"collection":[{"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=661"}],"version-history":[{"count":1,"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=\/wp\/v2\/posts\/661\/revisions"}],"predecessor-version":[{"id":663,"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=\/wp\/v2\/posts\/661\/revisions\/663"}],"wp:attachment":[{"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/metrics.blogg.gu.se\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}