Vulnerability identification technology research based on project version difference
The open source code hosting platform has brought power and opportunities to software development, but there are also many security risks.The open source code has poor quality, the dependency libraries of projects are complex and vulnerability collection platforms are inadequate in collecting vulner...
Saved in:
Main Authors: | Cheng HUANG, Mingxu SUN, Renyu DUAN, Susheng WU, Bin CHEN |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021094 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on key technology of vulnerability threat classification
by: Qi-xu LIU, et al.
Published: (2012-09-01) -
Automated vulnerability discovery method for 5G core network protocol
by: Peixiang WU, et al.
Published: (2024-02-01) -
Survey on static software vulnerability detection for source code
by: Zhen LI, et al.
Published: (2019-02-01) -
Design and implementation of national security vulnerability database
by: ZHANG Yu-qing1, et al.
Published: (2011-01-01) -
Research on Open-Source VoIP Technologies for NGN Service Platform Deployment
by: Lei Xia, et al.
Published: (2012-09-01)