Computer Applications and Software, Volume. 42, Issue 4, 1(2025)
A METHOD FOR FINDING AND PARSING PATCHES FOR OPEN SOURCE SOFTWARE VULNERABILITIES
[1] [1] Wang Y, Chen B, Huang K, et al. An empirical study of usages, updates and risks of third-party libraries in java projects[C]//2020 IEEE International Conference on Software Maintenance and Evolution. IEEE, 2020: 35-45.
[11] [11] Li F, Paxson V. A large-scale empirical study of security patches[C]//2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017: 2201-2215.
[12] [12] Liu B, Meng G, Zou W, et al. A large-scale empirical study on vulnerability distribution within projects and the lessons learned[C]//ACM/IEEE 42nd International Conference on Software Engineer. ACM, 2020: 1547-1559.
[13] [13] Ponta S E, Plate H, Sabetta A, et al. A manually-curated dataset of fixes to vulnerabilities of open-source software[C]//2019 IEEE/ACM 16th International Conference on Mining Software Repositories. IEEE, 2019: 383-387.
[14] [14] Fan J, Li Y, Wang S, et al. AC/C++ Code Vulnerability dataset with code changes and CVE summaries[C]//17th International Conference on Mining Software Repositories. IEEE, 2020: 508-512.
[15] [15] Jimenez M, Le Traon Y, Papadakis M. Enabling the continuous analysis of security vulnerabilities with VulData7[C]//2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation. IEEE, 2018: 56-61.
[16] [16] Li H, Kwon H, Kwon J, et al. A scalable approach for vulnerability discovery based on security patches[C]//International Conference on Applications and Techniques in Information Security. IEEE, 2014: 109-122.
[17] [17] Li Z, Zou D, Xu S, et al. VulPecker: An automated vulnerability detection system based on code similarity analysis[C]//32nd Annual Conference on Computer Security Applications. ACM, 2016: 201-213.
[18] [18] Li Z, Zou D, Xu S, et al. VulDeePecker: A deep learning-based system for vulnerability detection[EB]. arXiv: 1801.01681, 2018.
[19] [19] Kim S, Woo S, Lee H, et al. VUDDY: A scalable approach for vulnerable code clone discovery[C]//2017 IEEE Symposium on Security and Privacy. IEEE, 2017: 595-614.
[20] [20] Xu Y, Xu Z, Chen B, et al. Patch based vulnerability matching for binary programs[C]//29th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, 2020: 376-387.
[21] [21] Xiao Y, Chen B, Yu C, et al. MVP: Detecting vulnerabilities using patch-enhanced vulnerability signatures[C]//29th USENIX Security Symposium. ACM, 2020: 1165-1182.
Get Citation
Copy Citation Text
Xu Congying, Chen Bihuan, Zhao Wenyun. A METHOD FOR FINDING AND PARSING PATCHES FOR OPEN SOURCE SOFTWARE VULNERABILITIES[J]. Computer Applications and Software, 2025, 42(4): 1
Category:
Received: Jan. 15, 2022
Accepted: Aug. 25, 2025
Published Online: Aug. 25, 2025
The Author Email: