Durgapal et al., 2024 - Google Patents
Software vulnerabilities using artificial intelligenceDurgapal et al., 2024
- Document ID
- 7755430903996736139
- Author
- Durgapal H
- Kumar D
- Publication year
- Publication venue
- 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT)
External Links
Snippet
Software serves as a cornerstone in the functionality of devices and systems that seamlessly integrate into our daily lives. However, the complexity of these systems, often developed by multiple programmers, leaves room for inadvertent errors in the code. These errors, known …
- 238000013473 artificial intelligence 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Senanayake et al. | Android source code vulnerability detection: a systematic literature review | |
| Demilie et al. | Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques | |
| Shu et al. | Threat intelligence computing | |
| Zhang et al. | Efficiency and effectiveness of web application vulnerability detection approaches: A review | |
| Vellela et al. | Cyber threat detection in industry 4.0: Leveraging GloVe and self-attention mechanisms in BiLSTM for enhanced intrusion detection | |
| Oh et al. | volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model | |
| Zhang et al. | An automatic assessment method of cyber threat intelligence combined with ATT&CK matrix | |
| Yue et al. | Detecting APT attacks using an attack intent-driven and sequence-based learning approach | |
| Gorment et al. | A recent research on malware detection using machine learning algorithm: Current challenges and future works | |
| Chandran et al. | From static to ai-driven detection: A comprehensive review of obfuscated malware techniques | |
| Almutairi et al. | Web Security: Emerging Threats and Defense. | |
| Mail et al. | Malware detection system using cloud sandbox, machine learning | |
| AliAhmad et al. | Malware detection issues, future trends and challenges: a survey | |
| Kumar et al. | Iot malware detection using static and dynamic analysis techniques: A systematic literature review | |
| Durgapal et al. | Software vulnerabilities using artificial intelligence | |
| Mehedi et al. | DySec: a machine learning-based dynamic analysis for detecting malicious packages in PyPI ecosystem | |
| Zhang et al. | A survey on advanced persistent threat detection: a unified framework, challenges, and countermeasures | |
| Zhao et al. | Software vulnerability mining and analysis based on deep learning | |
| Appelt et al. | Assessing the impact of firewalls and database proxies on SQL injection testing | |
| Abuabid et al. | Cyber security incident response: The effectiveness of open-source detection tools in dll injection detection | |
| Aledam et al. | Enhanced Malware Detection for Mobile Operating Systems Using Machine Learning and Dynamic Analysis. | |
| McCoy | A relevance model for threat-centric ranking of cybersecurity vulnerabilities | |
| Altun et al. | Securing artificial intelligence: Exploring attack scenarios and defense strategies | |
| Zahid | Vulnerability detection and prevention: an approach to enhance cybersecurity | |
| Wang et al. | Attack Effect Model based Malicious Behavior Detection |