Aug. 3, 2022, 1:20 a.m. | Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie Williams

cs.CR updates on arXiv.org arxiv.org

CONTEXT: Applying vulnerability detection techniques is one of many tasks
using the limited resources of a software project.


OBJECTIVE: The goal of this research is to assist managers and other
decision-makers in making informed choices about the use of software
vulnerability detection techniques through an empirical study of the efficiency
and effectiveness of four techniques on a Java-based web application.


METHOD: We apply four different categories of vulnerability detection
techniques \textendash~ systematic manual penetration testing (SMPT),
exploratory manual penetration testing …

application case detection find java se study vulnerabilities vulnerability vulnerability detection work

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Oracle EBS DevSecOps Developer

@ Accenture Federal Services | Arlington, VA

Information Security GRC Specialist - Risk Program Lead

@ Western Digital | Irvine, CA, United States

Senior Cyber Operations Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

AI Cybersecurity Architect

@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)