Aug. 10, 2023, 1:11 a.m. | Tianyu Chen, Lin Li, Bingjie Shan, Guangtai Liang, Ding Li, Qianxiang Wang, Tao Xie

cs.CR updates on arXiv.org arxiv.org

To address security vulnerabilities arising from third-party libraries,
security researchers maintain databases monitoring and curating vulnerability
reports, e.g., the National Vulnerability Database (NVD). Application
developers can identify vulnerable libraries by directly querying the databases
with the name of each used library. However, the querying results of vulnerable
libraries are not reliable due to the incompleteness of vulnerability reports.
Thus, current approaches model the task of identifying vulnerable libraries as
a named-entity-recognition (NER) task or an extreme multi-label learning (XML)
task. …

address application application developers database databases descriptions developers identify library monitoring name national national vulnerability database nvd party reports researchers results security security researchers third third-party vulnerabilities vulnerability vulnerability database vulnerability reports vulnerable

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Staff Firmware Engineer – Networking & Firewall

@ Axiado | Bengaluru, India

Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)

@ SAP | Walldorf, DE, 69190

SAP Security Administrator

@ FARO Technologies | EMEA-Portugal