A Survey of the Key Technology of Software Vulnerability Mining

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In the current cyberspace, vulnerability has attracted the widespread attention. This paper briefly introduces the typical software vulnerability mining techniques. Based on the existing research work, this paper puts forward the whole idea of the research on the vulnerability mining technology of software in the future, and then makes some research on some key points and key technologies respectively. In this paper, a brief study of the software vulnerability mining technology is given, which is helpful to carry out the follow-up research work.

Cite

CITATION STYLE

APA

Lin, D., Wu, X., Wu, Q., Liu, Y., Zeng, J., & Tan, J. (2019). A Survey of the Key Technology of Software Vulnerability Mining. In Journal of Physics: Conference Series (Vol. 1187). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1187/5/052031

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free