Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
暂无分享,去创建一个
Wenbo Guo | Ying Dong | Xinyu Xing | Gang Wang | Yuqing Zhang | Yueqi Chen | Xinyu Xing | Wenbo Guo | Yueqi Chen | Gang Wang | Ying Dong | Yuqing Zhang
[1] Lu Zhang,et al. Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis , 2014, 2014 IEEE International Conference on Software Maintenance and Evolution.
[2] Thomas Zimmermann,et al. Duplicate bug reports considered harmful … really? , 2008, 2008 IEEE International Conference on Software Maintenance.
[3] Frederick Reiss,et al. Rule-Based Information Extraction is Dead! Long Live Rule-Based Information Extraction Systems! , 2013, EMNLP.
[4] Jeffrey Dean,et al. Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.
[5] Tao Xie,et al. Automated extraction of security policies from natural-language software documents , 2012, SIGSOFT FSE.
[6] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[7] Diyi Yang,et al. Hierarchical Attention Networks for Document Classification , 2016, NAACL.
[8] Gabriele Bavota,et al. Detecting missing information in bug descriptions , 2017, ESEC/SIGSOFT FSE.
[9] Danqi Chen,et al. A Fast and Accurate Dependency Parser using Neural Networks , 2014, EMNLP.
[10] Ruslan Salakhutdinov,et al. Transfer Learning for Sequence Tagging with Hierarchical Recurrent Networks , 2016, ICLR.
[11] Dan Klein,et al. Feature-Rich Part-of-Speech Tagging with a Cyclic Dependency Network , 2003, NAACL.
[12] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[13] Zhiyuan Liu,et al. Neural Relation Extraction with Selective Attention over Instances , 2016, ACL.
[14] Xiaofeng Wang,et al. UIPicker: User-Input Privacy Identification in Mobile Applications , 2015, USENIX Security Symposium.
[15] Wei Shi,et al. Attention-Based Bidirectional Long Short-Term Memory Networks for Relation Classification , 2016, ACL.
[16] Andrew Smith,et al. Using Gazetteers in Discriminative Information Extraction , 2006, CoNLL.
[17] Yuanyuan Zhou,et al. /*icomment: bugs or bad comments?*/ , 2007, SOSP.
[18] Steven Bird,et al. NLTK: The Natural Language Toolkit , 2002, ACL.
[19] Tao Xie,et al. Inferring Resource Specifications from Natural Language API Documentation , 2009, 2009 IEEE/ACM International Conference on Automated Software Engineering.
[20] Ido Dagan,et al. Supervised Open Information Extraction , 2018, NAACL.
[21] Doina Caragea,et al. Predicting Cyber Risks through National Vulnerability Database , 2015, Inf. Secur. J. A Glob. Perspect..
[22] Guillaume Lample,et al. Neural Architectures for Named Entity Recognition , 2016, NAACL.
[23] Peiyuan Zong,et al. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits , 2017, CCS.
[24] Zhou Li,et al. Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence , 2016, CCS.
[25] Daniel Jurafsky,et al. Distant supervision for relation extraction without labeled data , 2009, ACL.
[26] Bhavana S. Pansare,et al. Information Needs in Bug Reports : Improving Cooperation between Developers and Users , 2015 .
[27] Marc Roper,et al. What's in a bug report? , 2014, ESEM '14.
[28] ChengXiang Zhai,et al. Learning online discussion structures by conditional random fields , 2011, SIGIR.
[29] Gang Wang,et al. Understanding the Reproducibility of Crowd-reported Security Vulnerabilities , 2018, USENIX Security Symposium.
[30] Tudor Dumitras,et al. FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature , 2016, CCS.
[31] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[32] Leyla Bilge,et al. The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching , 2015, 2015 IEEE Symposium on Security and Privacy.
[33] Razvan C. Bunescu,et al. Learning to rank relevant files for bug reports using domain knowledge , 2014, SIGSOFT FSE.
[34] Xiangyu Zhang,et al. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps , 2015, USENIX Security Symposium.
[35] Marco Balduzzi,et al. Automatic Extraction of Indicators of Compromise for Web Applications , 2016, WWW.
[36] Sarfraz Khurshid,et al. Improving bug localization using structured information retrieval , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[37] Philip J. Guo,et al. Characterizing and predicting which bugs get fixed: an empirical study of Microsoft Windows , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[38] Tomas Mikolov,et al. Enriching Word Vectors with Subword Information , 2016, TACL.
[39] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[40] Christopher D. Manning,et al. Leveraging Linguistic Structure For Open Domain Information Extraction , 2015, ACL.
[41] Zhong Chen,et al. AutoCog: Measuring the Description-to-permission Fidelity in Android Applications , 2014, CCS.