[go: up one dir, main page]

Durgapal et al., 2024 - Google Patents

Software vulnerabilities using artificial intelligence

Durgapal et al., 2024

Document ID
7755430903996736139
Author
Durgapal H
Kumar D
Publication year
Publication venue
2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT)

External Links

Snippet

Software serves as a cornerstone in the functionality of devices and systems that seamlessly integrate into our daily lives. However, the complexity of these systems, often developed by multiple programmers, leaves room for inadvertent errors in the code. These errors, known …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
Senanayake et al. Android source code vulnerability detection: a systematic literature review
Demilie et al. Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques
Shu et al. Threat intelligence computing
Zhang et al. Efficiency and effectiveness of web application vulnerability detection approaches: A review
Vellela et al. Cyber threat detection in industry 4.0: Leveraging GloVe and self-attention mechanisms in BiLSTM for enhanced intrusion detection
Oh et al. volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model
Zhang et al. An automatic assessment method of cyber threat intelligence combined with ATT&CK matrix
Yue et al. Detecting APT attacks using an attack intent-driven and sequence-based learning approach
Gorment et al. A recent research on malware detection using machine learning algorithm: Current challenges and future works
Chandran et al. From static to ai-driven detection: A comprehensive review of obfuscated malware techniques
Almutairi et al. Web Security: Emerging Threats and Defense.
Mail et al. Malware detection system using cloud sandbox, machine learning
AliAhmad et al. Malware detection issues, future trends and challenges: a survey
Kumar et al. Iot malware detection using static and dynamic analysis techniques: A systematic literature review
Durgapal et al. Software vulnerabilities using artificial intelligence
Mehedi et al. DySec: a machine learning-based dynamic analysis for detecting malicious packages in PyPI ecosystem
Zhang et al. A survey on advanced persistent threat detection: a unified framework, challenges, and countermeasures
Zhao et al. Software vulnerability mining and analysis based on deep learning
Appelt et al. Assessing the impact of firewalls and database proxies on SQL injection testing
Abuabid et al. Cyber security incident response: The effectiveness of open-source detection tools in dll injection detection
Aledam et al. Enhanced Malware Detection for Mobile Operating Systems Using Machine Learning and Dynamic Analysis.
McCoy A relevance model for threat-centric ranking of cybersecurity vulnerabilities
Altun et al. Securing artificial intelligence: Exploring attack scenarios and defense strategies
Zahid Vulnerability detection and prevention: an approach to enhance cybersecurity
Wang et al. Attack Effect Model based Malicious Behavior Detection