Computer Applications and Software, Volume. 42, Issue 4, 1(2025)

A METHOD FOR FINDING AND PARSING PATCHES FOR OPEN SOURCE SOFTWARE VULNERABILITIES

Xu Congying1,2, Chen Bihuan1,2, and Zhao Wenyun1,2
Author Affiliations
  • 1Software School, Fudan University, Shanghai 200438, China
  • 2Shanghai Key Laboratory of Data Science, Shanghai 200438, China
  • show less
    References(12)

    [1] [1] Wang Y, Chen B, Huang K, et al. An empirical study of usages, updates and risks of third-party libraries in java projects[C]//2020 IEEE International Conference on Software Maintenance and Evolution. IEEE, 2020: 35-45.

    [11] [11] Li F, Paxson V. A large-scale empirical study of security patches[C]//2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017: 2201-2215.

    [12] [12] Liu B, Meng G, Zou W, et al. A large-scale empirical study on vulnerability distribution within projects and the lessons learned[C]//ACM/IEEE 42nd International Conference on Software Engineer. ACM, 2020: 1547-1559.

    [13] [13] Ponta S E, Plate H, Sabetta A, et al. A manually-curated dataset of fixes to vulnerabilities of open-source software[C]//2019 IEEE/ACM 16th International Conference on Mining Software Repositories. IEEE, 2019: 383-387.

    [14] [14] Fan J, Li Y, Wang S, et al. AC/C++ Code Vulnerability dataset with code changes and CVE summaries[C]//17th International Conference on Mining Software Repositories. IEEE, 2020: 508-512.

    [15] [15] Jimenez M, Le Traon Y, Papadakis M. Enabling the continuous analysis of security vulnerabilities with VulData7[C]//2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation. IEEE, 2018: 56-61.

    [16] [16] Li H, Kwon H, Kwon J, et al. A scalable approach for vulnerability discovery based on security patches[C]//International Conference on Applications and Techniques in Information Security. IEEE, 2014: 109-122.

    [17] [17] Li Z, Zou D, Xu S, et al. VulPecker: An automated vulnerability detection system based on code similarity analysis[C]//32nd Annual Conference on Computer Security Applications. ACM, 2016: 201-213.

    [18] [18] Li Z, Zou D, Xu S, et al. VulDeePecker: A deep learning-based system for vulnerability detection[EB]. arXiv: 1801.01681, 2018.

    [19] [19] Kim S, Woo S, Lee H, et al. VUDDY: A scalable approach for vulnerable code clone discovery[C]//2017 IEEE Symposium on Security and Privacy. IEEE, 2017: 595-614.

    [20] [20] Xu Y, Xu Z, Chen B, et al. Patch based vulnerability matching for binary programs[C]//29th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, 2020: 376-387.

    [21] [21] Xiao Y, Chen B, Yu C, et al. MVP: Detecting vulnerabilities using patch-enhanced vulnerability signatures[C]//29th USENIX Security Symposium. ACM, 2020: 1165-1182.

    Tools

    Get Citation

    Copy Citation Text

    Xu Congying, Chen Bihuan, Zhao Wenyun. A METHOD FOR FINDING AND PARSING PATCHES FOR OPEN SOURCE SOFTWARE VULNERABILITIES[J]. Computer Applications and Software, 2025, 42(4): 1

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Jan. 15, 2022

    Accepted: Aug. 25, 2025

    Published Online: Aug. 25, 2025

    The Author Email:

    DOI:10.3969/j.issn.1000-386x.2025.04.001

    Topics