Learning Optimized Patterns of Software Vulnerabilities with the Clock-Work Memory Mechanism
| dc.contributor.author | Şahin, Canan Batur | |
| dc.date.accessioned | 2025-10-24T17:59:10Z | |
| dc.date.available | 2025-10-24T17:59:10Z | |
| dc.date.issued | 2022 | |
| dc.department | Malatya Turgut Özal Üniversitesi | |
| dc.description.abstract | It is possible to better provide the security of the codebase and keep testing efforts at a minimum level by detecting vulnerable codes early in the course of software development. We assume that nature-inspired metaheuristic optimization algorithms can obtain “optimized patterns” from vulnerabilities created in an artificial manner. This study aims to use nature-inspired optimization algorithms combining heterogeneous data sources with the objective of learning optimized representations of vulnerable source codes. The chosen vulnerability-relevant data sources are cross-domain, involving historical vulnerability data from variable software projects and data from the Software Assurance Reference Database (SARD) comprising vulnerability examples. The main purpose of this paper is to outline the state-of-the-art and to analyze and discuss open challenges with regard to the most relevant areas in the field of bio-inspired optimization based on the representation of software vulnerability. Empirical research has demonstrated that the optimized representations produced by the suggested nature-inspired optimization algorithms are feasible and efficient and can be transferred for real-world vulnerability detection. | |
| dc.description.abstract | It is possible to better provide the security of the codebase and keep testing efforts at a minimum level by detecting vulnerable codes early in the course of software development. We assume that nature-inspired metaheuristic optimization algorithms can obtain “optimized patterns” from vulnerabilities created in an artificial manner. This study aims to use nature-inspired optimization algorithms combining heterogeneous data sources with the objective of learning optimized representations of vulnerable source codes. The chosen vulnerability-relevant data sources are cross-domain, involving historical vulnerability data from variable software projects and data from the Software Assurance Reference Database (SARD) comprising vulnerability examples. The main purpose of this paper is to outline the state-of-the-art and to analyze and discuss open challenges with regard to the most relevant areas in the field of bio-inspired optimization based on the representation of software vulnerability. Empirical research has demonstrated that the optimized representations produced by the suggested nature-inspired optimization algorithms are feasible and efficient and can be transferred for real-world vulnerability detection. | |
| dc.identifier.doi | 10.31590/ejosat.1159875 | |
| dc.identifier.endpage | 165 | |
| dc.identifier.issn | 2148-2683 | |
| dc.identifier.issue | 41 | |
| dc.identifier.startpage | 156 | |
| dc.identifier.uri | https://doi.org/10.31590/ejosat.1159875 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12899/1949 | |
| dc.language.iso | en | |
| dc.publisher | Osman SAĞDIÇ | |
| dc.relation.ispartof | European Journal of Science and Technology | |
| dc.relation.publicationcategory | Makale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanı | |
| dc.rights | info:eu-repo/semantics/openAccess | |
| dc.snmz | DergiPark_20251023 | |
| dc.subject | Engineering | |
| dc.subject | Mühendislik | |
| dc.title | Learning Optimized Patterns of Software Vulnerabilities with the Clock-Work Memory Mechanism | |
| dc.title.alternative | Learning Optimized Patterns of Software Vulnerabilities with the Clock-Work Memory Mechanism | |
| dc.type | Article |












