Skip to main content

Showing 1–11 of 11 results for author: Hegedűs, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.08025  [pdf, ps, other

    cs.CR cs.SE

    A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages

    Authors: Gábor Antal, Balázs Mosolygó, Norbert Vándor, Péter Hegedüs

    Abstract: The number of people accessing online services is increasing day by day, and with new users, comes a greater need for effective and responsive cyber-security. Our goal in this study was to find out if there are common patterns within the most widely used programming languages in terms of security issues and fixes. In this paper, we showcase some statistics based on the data we extracted for these… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  2. arXiv:2405.07244  [pdf, other

    cs.SE

    Enhanced Bug Prediction in JavaScript Programs with Hybrid Call-Graph Based Invocation Metrics

    Authors: Gábor Antal, Zoltán Tóth, Péter Hegedűs, Rudolf Ferenc

    Abstract: Bug prediction aims at finding source code elements in a software system that are likely to contain defects. Being aware of the most error-prone parts of the program, one can efficiently allocate the limited amount of testing and code review resources. Therefore, bug prediction can support software maintenance and evolution to a great extent. In this paper, we propose a function level JavaScript b… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  3. arXiv:2405.07213  [pdf, other

    cs.CR cs.SE

    Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions

    Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy

    Abstract: The rapid rise of cyber-crime activities and the growing number of devices threatened by them place software security issues in the spotlight. As around 90% of all attacks exploit known types of security issues, finding vulnerable components and applying existing mitigation techniques is a viable practical approach for fighting against cyber-crime. In this paper, we investigate how the state-of-th… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  4. arXiv:2405.07206  [pdf, other

    cs.SE

    Static JavaScript Call Graphs: A Comparative Study

    Authors: Gábor Antal, Péter Hegedűs, Zoltán Tóth, Rudolf Ferenc, Tibor Gyimóthy

    Abstract: The popularity and wide adoption of JavaScript both at the client and server side makes its code analysis more important than ever before. Most of the algorithms for vulnerability analysis, coding issue detection, or type inference rely on the call graph representation of the underlying program. Despite some obvious advantages of dynamic analysis, static algorithms should also be considered for ca… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  5. arXiv:2309.00687  [pdf, ps, other

    cs.IT math.NT

    On Linear Codes with Random Multiplier Vectors and the Maximum Trace Dimension Property

    Authors: Márton Erdélyi, Pál Hegedüs, Sándor Z. Kiss, Gábor P. Nagy

    Abstract: Let $C$ be a linear code of length $n$ and dimension $k$ over the finite field $\mathbb{F}_{q^m}$. The trace code $\mathrm{Tr}(C)$ is a linear code of the same length $n$ over the subfield $\mathbb{F}_q$. The obvious upper bound for the dimension of the trace code over $\mathbb{F}_q$ is $mk$. If equality holds, then we say that $C$ has maximum trace dimension. The problem of finding the true dimen… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

    MSC Class: 11T71; 15A03

  6. arXiv:2303.16591  [pdf, other

    cs.SE

    An AST-based Code Change Representation and its Performance in Just-in-time Vulnerability Prediction

    Authors: Tamás Aladics, Péter Hegedűs, Rudolf Ferenc

    Abstract: The presence of software vulnerabilities is an ever-growing issue in software development. In most cases, it is desirable to detect vulnerabilities as early as possible, preferably in a just-in-time manner, when the vulnerable piece is added to the code base. The industry has a hard time combating this problem as manual inspection is costly and traditional means, such as rule-based bug detection,… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

  7. arXiv:2108.02044  [pdf, ps, other

    cs.SE

    A Comparison of Different Source Code Representation Methods for Vulnerability Prediction in Python

    Authors: Amirreza Bagheri, Péter Hegedűs

    Abstract: In the age of big data and machine learning, at a time when the techniques and methods of software development are evolving rapidly, a problem has arisen: programmers can no longer detect all the security flaws and vulnerabilities in their code manually. To overcome this problem, developers can now rely on automatic techniques, like machine learning based prediction models, to detect such issues.… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

  8. arXiv:2105.07527  [pdf, other

    cs.CR cs.SE

    Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics

    Authors: Tamás Viszkok, Péter Hegedűs, Rudolf Ferenc

    Abstract: Due to the growing number of cyber attacks against computer systems, we need to pay special attention to the security of our software systems. In order to maximize the effectiveness, excluding the human component from this process would be a huge breakthrough. The first step towards this is to automatically recognize the vulnerable parts in our code. Researchers put a lot of effort into creating m… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

  9. arXiv:2103.09604  [pdf, other

    cs.SE

    On the Rise and Fall of Simple Stupid Bugs: a Life-Cycle Analysis of SStuBs

    Authors: Balázs Mosolygó, Norbert Vándor, Gábor Antal, Péter Hegedűs

    Abstract: Bug detection and prevention is one of the most important goals of software quality assurance. Nowadays, many of the major problems faced by developers can be detected or even fixed fully or partially with automatic tools. However, recent works explored that there exists a substantial amount of simple yet very annoying errors in code-bases, which are easy to fix, but hard to detect as they do not… ▽ More

    Submitted 17 March, 2021; originally announced March 2021.

  10. arXiv:2011.01214  [pdf, other

    cs.SE stat.AP

    Employing Partial Least Squares Regression with Discriminant Analysis for Bug Prediction

    Authors: Rudolf Ferenc, István Siket, Péter Hegedűs, Róbert Rajkó

    Abstract: Forecasting defect proneness of source code has long been a major research concern. Having an estimation of those parts of a software system that most likely contain bugs may help focus testing efforts, reduce costs, and improve product quality. Many prediction models and approaches have been introduced during the past decades that try to forecast bugged code elements based on static source code m… ▽ More

    Submitted 2 November, 2020; originally announced November 2020.

  11. arXiv:2006.13652  [pdf, other

    cs.SE cs.PL

    Exploring the Security Awareness of the Python and JavaScript Open Source Communities

    Authors: Gábor Antal, Márton Keleti, Péter Hegedűs

    Abstract: Software security is undoubtedly a major concern in today's software engineering. Although the level of awareness of security issues is often high, practical experiences show that neither preventive actions nor reactions to possible issues are always addressed properly in reality. By analyzing large quantities of commits in the open-source communities, we can categorize the vulnerabilities mitigat… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: 17th International Conference on Mining Software Repositories