Security bug

Known as: Security bugs, Software security bug 
A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system. Security… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Empirical Analysis and Automated Classification of Security Bug Reports 
  • figure 3.1
  • figure 3.2
  • figure 3.3
  • figure 3.4
  • figure 3.5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
To design effective tools for detecting and recovering from software failures requires a deep understanding of software bug… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2013
2013
Software bugs comprise the greatest threat to computer security today. Though enormous effort has been expended on eliminating… (More)
  • figure 1
  • figure 4
  • figure 6
  • figure 5
  • table 1
Is this relevant?
2013
2013
Background. Security bugs are critical programming errors that can lead to serious vulnerabilities in software. Such bugs may… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
A good understanding of the impact of different types of bugs on various project aspects is essential to improve software quality… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams… (More)
  • table I
  • table II
  • figure I
  • table III
  • table IV
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Software errors are a major cause for system failures. To effectively design tools and support for detecting and recovering from… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Most memory corruption attacks and Internet worms follow a familiar pattern known as the control-data attack. Hence, many… (More)
  • figure 1
  • table 1
  • figure 2
  • table 3
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
source-code security analysis with static analysis tools. Since ITS4's release in early 2000 (www.cigital.com/its4/), the idea of… (More)
  • figure 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Improperly bounded program inputs present a major class of program defects. In secure applications, these bugs can be exploited… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?