Learning Optimized Patterns of Software Vulnerabilities with the Clock-Work Memory Mechanism

dc.contributor.authorŞahin, Canan Batur
dc.date.accessioned2025-10-24T17:59:10Z
dc.date.available2025-10-24T17:59:10Z
dc.date.issued2022
dc.departmentMalatya Turgut Özal Üniversitesi
dc.description.abstractIt is possible to better provide the security of the codebase and keep testing efforts at a minimum level by detecting vulnerable codes early in the course of software development. We assume that nature-inspired metaheuristic optimization algorithms can obtain “optimized patterns” from vulnerabilities created in an artificial manner. This study aims to use nature-inspired optimization algorithms combining heterogeneous data sources with the objective of learning optimized representations of vulnerable source codes. The chosen vulnerability-relevant data sources are cross-domain, involving historical vulnerability data from variable software projects and data from the Software Assurance Reference Database (SARD) comprising vulnerability examples. The main purpose of this paper is to outline the state-of-the-art and to analyze and discuss open challenges with regard to the most relevant areas in the field of bio-inspired optimization based on the representation of software vulnerability. Empirical research has demonstrated that the optimized representations produced by the suggested nature-inspired optimization algorithms are feasible and efficient and can be transferred for real-world vulnerability detection.
dc.description.abstractIt is possible to better provide the security of the codebase and keep testing efforts at a minimum level by detecting vulnerable codes early in the course of software development. We assume that nature-inspired metaheuristic optimization algorithms can obtain “optimized patterns” from vulnerabilities created in an artificial manner. This study aims to use nature-inspired optimization algorithms combining heterogeneous data sources with the objective of learning optimized representations of vulnerable source codes. The chosen vulnerability-relevant data sources are cross-domain, involving historical vulnerability data from variable software projects and data from the Software Assurance Reference Database (SARD) comprising vulnerability examples. The main purpose of this paper is to outline the state-of-the-art and to analyze and discuss open challenges with regard to the most relevant areas in the field of bio-inspired optimization based on the representation of software vulnerability. Empirical research has demonstrated that the optimized representations produced by the suggested nature-inspired optimization algorithms are feasible and efficient and can be transferred for real-world vulnerability detection.
dc.identifier.doi10.31590/ejosat.1159875
dc.identifier.endpage165
dc.identifier.issn2148-2683
dc.identifier.issue41
dc.identifier.startpage156
dc.identifier.urihttps://doi.org/10.31590/ejosat.1159875
dc.identifier.urihttps://hdl.handle.net/20.500.12899/1949
dc.language.isoen
dc.publisherOsman SAĞDIÇ
dc.relation.ispartofEuropean Journal of Science and Technology
dc.relation.publicationcategoryMakale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/openAccess
dc.snmzDergiPark_20251023
dc.subjectEngineering
dc.subjectMühendislik
dc.titleLearning Optimized Patterns of Software Vulnerabilities with the Clock-Work Memory Mechanism
dc.title.alternativeLearning Optimized Patterns of Software Vulnerabilities with the Clock-Work Memory Mechanism
dc.typeArticle

Dosyalar