Skip to Content
You are currently on the new version of our website. Access the old version .

900 Results Found

  • Article
  • Open Access
22 Citations
6,149 Views
27 Pages

On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids

  • Christos-Minas Mathas,
  • Costas Vassilakis,
  • Nicholas Kolokotronis,
  • Charilaos C. Zarakovitis and
  • Michail-Alexandros Kourtis

14 May 2021

The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. In this setting, the Internet of Things (IoT) will proliferate, and IoT devices w...

  • Article
  • Open Access
8 Citations
4,043 Views
25 Pages

Time Series Forecasting of Software Vulnerabilities Using Statistical and Deep Learning Models

  • Ilias Kalouptsoglou,
  • Dimitrios Tsoukalas,
  • Miltiadis Siavvas,
  • Dionysios Kehagias,
  • Alexander Chatzigeorgiou and
  • Apostolos Ampatzoglou

7 September 2022

Software security is a critical aspect of modern software products. The vulnerabilities that reside in their source code could become a major weakness for enterprises that build or utilize these products, as their exploitation could lead to devastati...

  • Article
  • Open Access
2 Citations
5,582 Views
19 Pages

Fuzz testing is a simple automated software testing approach that discovers software vulnerabilities at a high level of performance by using randomly generated seeds. However, it is restrained by coverage and thus, there are chances of finding bugs e...

  • Article
  • Open Access
4 Citations
4,201 Views
22 Pages

BugMiner: Mining the Hard-to-Reach Software Vulnerabilities through the Target-Oriented Hybrid Fuzzer

  • Fayozbek Rustamov,
  • Juhwan Kim,
  • Jihyeon Yu,
  • Hyunwook Kim and
  • Joobeom Yun

Greybox Fuzzing is the most reliable and essentially powerful technique for automated software testing. Notwithstanding, a majority of greybox fuzzers are not effective in directed fuzzing, for example, towards complicated patches, as well as towards...

  • Article
  • Open Access
2 Citations
4,156 Views
30 Pages

4 January 2020

Current research on software vulnerability analysis mostly focus on source codes or executable programs. But these methods can only be applied after software is completely developed when source codes are available. This may lead to high costs and tre...

  • Article
  • Open Access
3 Citations
3,317 Views
18 Pages

14 September 2022

Vulnerability lifecycles and the vulnerability markets are related in a manner that can lead to serious security and economic risks, especially regarding black markets. In the current era, this is a relationship that requires careful scrutiny from so...

  • Article
  • Open Access
5 Citations
12,347 Views
24 Pages

24 February 2024

Cybersecurity failures have become increasingly detrimental to organizations worldwide, impacting their finances, operations, and reputation. This issue is worsened by the scarcity of cybersecurity professionals. Moreover, the specialization required...

  • Article
  • Open Access
19 Citations
3,544 Views
23 Pages

Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction

  • Ilias Kalouptsoglou,
  • Miltiadis Siavvas,
  • Dionysios Kehagias,
  • Alexandros Chatzigeorgiou and
  • Apostolos Ampatzoglou

5 May 2022

Software security is a very important aspect for software development organizations who wish to provide high-quality and dependable software to their consumers. A crucial part of software security is the early detection of software vulnerabilities. V...

  • Article
  • Open Access
5 Citations
4,247 Views
21 Pages

A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk

  • Panagiotis Sotiropoulos,
  • Christos-Minas Mathas,
  • Costas Vassilakis and
  • Nicholas Kolokotronis

Current Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System architects create system blueprints and draw specifications for the software artefacts that are n...

  • Article
  • Open Access
2 Citations
2,959 Views
14 Pages

Searching Open-Source Vulnerability Function Based on Software Modularization

  • Xixi Guo,
  • Ruijie Cai,
  • Xiaokang Yin,
  • Wenqiang Shao and
  • Shengli Liu

4 January 2023

Vulnerable open-source component reuse can lead to security problems. At present, open-source component detection for binary programs can only reveal whether open-source components with vulnerabilities are reused, which cannot determine the specific...

  • Article
  • Open Access
1 Citations
2,103 Views
15 Pages

11 April 2024

Given a set of software programs, each being labeled either as vulnerable or benign, deep learning technology can be used to automatically build a software vulnerability detector. A challenge in this context is that there are countless equivalent way...

  • Article
  • Open Access
7 Citations
3,088 Views
27 Pages

Software vulnerability detection aims to proactively reduce the risk to software security and reliability. Despite advancements in deep-learning-based detection, a semantic gap still remains between learned features and human-understandable vulnerabi...

  • Review
  • Open Access
3,273 Views
34 Pages

14 November 2025

Software vulnerabilities pose significant risks to the security and reliability of modern systems, making automated vulnerability detection an essential research area. Traditional static and rule-based approaches are limited in scalability and adapta...

  • Article
  • Open Access
15 Citations
6,678 Views
27 Pages

24 September 2023

The onset of the COVID-19 pandemic prompted educational institutions to swiftly integrate e-learning software systems, including learning management systems (LMSs), as essential tools for online education. This study aims to probe the inherent securi...

  • Article
  • Open Access
27 Citations
8,217 Views
16 Pages

This study investigates the efficacy of advanced large language models, specifically GPT-4o, Claude-3.5 Sonnet, and GPT-3.5 Turbo, in detecting software vulnerabilities. Our experiment utilized vulnerable and secure code samples from the NIST Softwar...

  • Article
  • Open Access
12 Citations
1,953 Views
40 Pages

Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities

  • Igor Kotenko,
  • Konstantin Izrailov,
  • Mikhail Buinevich,
  • Igor Saenko and
  • Rajeev Shorey

2 July 2023

This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the s...

  • Article
  • Open Access
145 Views
23 Pages

4 February 2026

Cross-project software vulnerability detection must cope with pronounced domain shift and severe class imbalance, while the target project is typically unlabeled. Existing unsupervised domain adaptation techniques either focus on marginal alignment a...

  • Article
  • Open Access
7 Citations
3,586 Views
16 Pages

27 March 2023

Online security threats have arisen through Internet banking hacking cases, and highly sensitive user information such as the ID, password, account number, and account password that is used for online payments has become vulnerable. Many security com...

  • Article
  • Open Access
Sensors2026, 26(4), 1246;https://doi.org/10.3390/s26041246 
(registering DOI)

14 February 2026

The S-100 standard for Electronic Chart Display and Information Systems (ECDIS) uses Lua scripts to render electronic charts, yet lacks security specifications for script execution. This paper evaluates automated Static Application Security Testing (...

  • Article
  • Open Access
26 Citations
5,270 Views
26 Pages

Efficient Feature Selection for Static Analysis Vulnerability Prediction

  • Katarzyna Filus,
  • Paweł Boryszko,
  • Joanna Domańska,
  • Miltiadis Siavvas and
  • Erol Gelenbe

6 February 2021

Common software vulnerabilities can result in severe security breaches, financial losses, and reputation deterioration and require research effort to improve software security. The acceleration of the software production cycle, limited testing resour...

  • Article
  • Open Access
576 Views
19 Pages

22 October 2025

Public CVE feeds add tens of thousands of entries each year, overwhelming patch-management capacity. We model the CWE–CVE–CPE triad and, for each CWE, build count-weighted product co-exposure graphs by projecting CVE–CPE links. Beca...

  • Article
  • Open Access
1,024 Views
31 Pages

Common Weakness Enumerations (CWEs) and Common Vulnerabilities and Exposures (CVEs) are open knowledge bases that provide definitions, descriptions, and samples of code vulnerabilities. The combination of Large Language Models (LLMs) with vulnerabili...

  • Systematic Review
  • Open Access
44 Citations
10,210 Views
24 Pages

A Systematic Review of Fault Injection Attacks on IoT Systems

  • Aakash Gangolli,
  • Qusay H. Mahmoud and
  • Akramul Azim

The field of the Internet of Things (IoT) is growing at a breakneck pace and its applications are becoming increasingly sophisticated with time. Fault injection attacks on IoT systems are aimed at altering software behavior by introducing faults into...

  • Article
  • Open Access
1 Citations
3,922 Views
15 Pages

1 July 2024

In current software applications, numerous vulnerabilities may be present. Attackers attempt to exploit these vulnerabilities, leading to security breaches, unauthorized entry, data theft, or the incapacitation of computer systems. Instead of address...

  • Article
  • Open Access
8 Citations
3,808 Views
19 Pages

28 April 2024

The emergence of security vulnerabilities and risks in software development assisted by self-generated tools, particularly with regard to the generation of code that lacks due consideration of security measures, could have significant consequences fo...

  • Article
  • Open Access
14 Citations
7,005 Views
17 Pages

A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management

  • Pietro Russo,
  • Alberto Caponi,
  • Marco Leuti and
  • Giuseppe Bianchi

17 July 2019

Cyber risk management is a very important problem for every company connected to the internet. Usually, risk management is done considering only Risk Analysis without connecting it with Vulnerability Assessment, using external and expensive tools. In...

  • Article
  • Open Access
3,559 Views
18 Pages

14 December 2024

Software testing is an important step in the software development life cycle to ensure the quality and security of software. Fuzzing is a security testing technique that finds vulnerabilities automatically without accessing the source code. We built...

  • Article
  • Open Access
5 Citations
5,008 Views
34 Pages

Security Monitoring during Software Development: An Industrial Case Study

  • Miltiadis Siavvas,
  • Dimitrios Tsoukalas,
  • Ilias Kalouptsoglou,
  • Evdoxia Manganopoulou,
  • Georgios Manolis,
  • Dionysios Kehagias and
  • Dimitrios Tzovaras

6 June 2023

The devastating consequences of successful security breaches that have been observed recently have forced more and more software development enterprises to shift their focus towards building software products that are highly secure (i.e., vulnerabili...

  • Article
  • Open Access
3 Citations
2,448 Views
39 Pages

Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning

  • Pablo Corona-Fraga,
  • Aldo Hernandez-Suarez,
  • Gabriel Sanchez-Perez,
  • Linda Karina Toscano-Medina,
  • Hector Perez-Meana,
  • Jose Portillo-Portillo,
  • Jesus Olivares-Mercado and
  • Luis Javier García Villalba

14 January 2025

In cybersecurity, identifying and addressing vulnerabilities in source code is essential for maintaining secure IT environments. Traditional static and dynamic analysis techniques, although widely used, often exhibit high false-positive rates, elevat...

  • Article
  • Open Access
259 Views
28 Pages

With the rapid growth in the scale and complexity of software systems, automated vulnerability detection has become increasingly important. Although Large Language Models (LLMs) demonstrate strong code comprehension capabilities, their abilities in v...

  • Article
  • Open Access
2 Citations
2,579 Views
15 Pages

Common Weakness Enumeration (CWE) refers to a list of faults caused from software or hardware. The CWE includes the faults related to programming language and security. We propose a technique to detect the vulnerabilities from incorrect use of a vari...

  • Article
  • Open Access
3 Citations
2,886 Views
38 Pages

Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?

  • Sundarakrishnan Ganesh,
  • Francis Palma and
  • Tobias Olsson

7 September 2022

Modern systems produce and handle a large volume of sensitive enterprise data. Therefore, security vulnerabilities in the software systems must be identified and resolved early to prevent security breaches and failures. Predicting security vulnerabil...

  • Article
  • Open Access
5 Citations
4,017 Views
21 Pages

TACSan: Enhancing Vulnerability Detection with Graph Neural Network

  • Qingyao Zeng,
  • Dapeng Xiong,
  • Zhongwang Wu,
  • Kechang Qian,
  • Yu Wang and
  • Yinghao Su

26 September 2024

With the increasing scale and complexity of software, the advantages of using neural networks for static vulnerability detection are becoming increasingly prominent. Before inputting into a neural network, the source code needs to undergo word embedd...

  • Article
  • Open Access
8 Citations
3,048 Views
23 Pages

11 November 2019

With the continuous development of smart distribution networks, their observable problems have become more serious. Research on the optimal placement of the distribution phasor measurement unit (D-PMU) is an important way to improve the measurability...

  • Article
  • Open Access
17 Citations
5,818 Views
14 Pages

P-Fuzz: A Parallel Grey-Box Fuzzing Framework

  • Congxi Song,
  • Xu Zhou,
  • Qidi Yin,
  • Xinglu He,
  • Hangwei Zhang and
  • Kai Lu

25 November 2019

Fuzzing is an effective technology in software testing and security vulnerability detection. Unfortunately, fuzzing is an extremely compute-intensive job, which may cause thousands of computing hours to find a bug. Current novel works generally impro...

  • Article
  • Open Access
57 Citations
7,363 Views
20 Pages

SEVUCAS: A Novel GIS-Based Machine Learning Software for Seismic Vulnerability Assessment

  • Saro Lee,
  • Mahdi Panahi,
  • Hamid Reza Pourghasemi,
  • Himan Shahabi,
  • Mohsen Alizadeh,
  • Ataollah Shirzadi,
  • Khabat Khosravi,
  • Assefa M. Melesse,
  • Mohamad Yekrangnia and
  • Baharin Bin Ahmad
  • + 3 authors

24 August 2019

Since it is not possible to determine the exact time of a natural disaster’s occurrence and the amount of physical and financial damage on humans or the environment resulting from their event, decision-makers need to identify areas with potenti...

  • Article
  • Open Access
1,838 Views
24 Pages

13 November 2024

This paper addresses the problem of IoT security caused by code cloning when developing a massive variety of different smart devices. A clone detection method is proposed to identify clone-caused vulnerabilities in IoT software. A hybrid solution com...

  • Article
  • Open Access
15 Citations
3,621 Views
17 Pages

PreNNsem: A Heterogeneous Ensemble Learning Framework for Vulnerability Detection in Software

  • Lu Wang,
  • Xin Li,
  • Ruiheng Wang,
  • Yang Xin,
  • Mingcheng Gao and
  • Yulin Chen

10 November 2020

Automated vulnerability detection is one of the critical issues in the realm of software security. Existing solutions to this problem are mostly based on features that are defined by human experts and directly lead to missed potential vulnerability....

  • Article
  • Open Access
7 Citations
3,132 Views
16 Pages

25 January 2021

Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing concentrates more computing resources on suspected vulnerable points to improve the testing eff...

  • Article
  • Open Access
20 Citations
3,834 Views
19 Pages

20 March 2024

Spoofing, alongside jamming of the Global Navigation Satellite System signal, remains a significant hazard during general aviation or Unmanned Aerial Vehicle operations. As aircraft utilize various support systems for navigation, such as INS, an insu...

  • Article
  • Open Access
4 Citations
3,652 Views
33 Pages

14 March 2025

Vulnerability detection in software source code is crucial in ensuring software security. Existing models face challenges with dataset class imbalance and long training times. To address these issues, this paper introduces a multi-feature screening a...

  • Article
  • Open Access
2 Citations
4,306 Views
29 Pages

13 June 2025

The increasing complexity of software systems has heightened the need for efficient and accurate vulnerability detection. Large Language Models have emerged as promising tools in this domain; however, their reasoning capabilities and limitations rema...

  • Review
  • Open Access
3 Citations
4,300 Views
15 Pages

An Analytical Review of the Source Code Models for Exploit Analysis

  • Elena Fedorchenko,
  • Evgenia Novikova,
  • Andrey Fedorchenko and
  • Sergei Verevkin

8 September 2023

Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective respo...

  • Article
  • Open Access
2 Citations
2,119 Views
19 Pages

Recent Machine Learning–Assisted Software Vulnerability Detection (MLAVD) research has focused on large-scale models with hundreds of millions of parameters powered by expensive attention- or graph-based architectures. Despite increased model c...

  • Article
  • Open Access
7 Citations
12,045 Views
22 Pages

A Survey of Bug Bounty Programs in Strengthening Cybersecurity and Privacy in the Blockchain Industry

  • Junaid Arshad,
  • Muhammad Talha,
  • Bilal Saleem,
  • Zoha Shah,
  • Huzaifa Zaman and
  • Zia Muhammad

The increasing reliance on computer networks and blockchain technology has led to a growing concern for cybersecurity and privacy. The emergence of zero-day vulnerabilities and unexpected exploits has highlighted the need for innovative solutions to...

  • Article
  • Open Access
27 Citations
5,126 Views
28 Pages

Application of Multi-Criteria Decision-Making Model and Expert Choice Software for Coastal City Vulnerability Evaluation

  • Milad Bagheri,
  • Zelina Zaiton Ibrahim,
  • Shattri Mansor,
  • Latifah Abd Manaf,
  • Mohd Fadzil Akhir,
  • Wan Izatul Asma Wan Talaat and
  • Amin Beiranvand Pour

1 November 2021

Climate change is regarded as a serious threat to both environment and humanity, and as a result, it has piqued worldwide attention in the twenty-first century. Natural hazards are expected to have major effects in the coastal cities of the globe. At...

  • Article
  • Open Access
3 Citations
2,893 Views
18 Pages

The most severe problem in cross-programming languages is feature extraction due to different tokens in different programming languages. To solve this problem, we propose a cross-programming-language vulnerability detection method in this paper, IRC-...

  • Article
  • Open Access
4 Citations
3,589 Views
30 Pages

MultiTagging: A Vulnerable Smart Contract Labeling and Evaluation Framework

  • Shikah J. Alsunaidi,
  • Hamoud Aljamaan and
  • Mohammad Hammoudeh

22 November 2024

Identifying vulnerabilities in Smart Contracts (SCs) is crucial, as they can lead to significant financial losses if exploited. Although various SC vulnerability identification methods exist, selecting the most effective approach remains challenging....

  • Article
  • Open Access
1 Citations
3,313 Views
17 Pages

10 February 2023

Vulnerability prediction, in which static analysis is leveraged to predict the vulnerabilities of binary programs, has become a popular research topic. Traditional vulnerability prediction methods depend on vulnerability patterns, which must be prede...

  • Article
  • Open Access
9 Citations
7,008 Views
25 Pages

Fault injection simulation on embedded software is typically captured using a high-level fault model that expresses fault behavior in terms of programmer-observable quantities. These fault models hide the true sensitivity of the underlying processor...

of 18