Mokhov, Serguei A. (2010) MARFCAT 0.0.1 Alpha 2 Application and its Input Data Files for Machine Learning of CVE and CWE Entries. [Dataset]
Archive (TGZ) (MARFCAT 0.0.1 Alpha 2 application's source code and its input data files for machine learning of CVE and CWE entries)
- Published Version
Official URL: http://sourceforge.net/projects/marf/files/Applica...
MARFCAT stands for MARF-based Code Analysis Tool. MARFCAT is a Java-based open-source application that uses MARF as its base for pattern recognition, machine learning, data mining, and fingerprinting, applied to the static code analysis to detect and fingerprint security-related weaknesses and vulnerabilities in the code. The application was used and presented at the SATE2010 workshop on static code analysis tool exposition held at NIST in October 2010. It is accompanied by a published report listed separately.
|Divisions:||Concordia University > Faculty of Engineering and Computer Science > Computer Science and Software Engineering|
Concordia University > Faculty of Engineering and Computer Science > Concordia Institute for Information Systems Engineering
Concordia University > Research Units > Centre for Pattern Recognition and Machine Intelligence
Concordia University > Research Units > Centre for Signal Processing and Communications
Concordia University > Research Units > Computer Security Laboratory
|Authors:||Mokhov, Serguei A.|
|Keywords:||MARF, MARFCAT, static code analysis, vulnerabilities, machine learning, data mining, signal processing|
|Deposited By:||Serguei Mokhov|
|Deposited On:||05 Jan 2012 17:03|
|Last Modified:||17 Apr 2012 20:16|
|Additional Information:||Complementary computer program and input data to the work "The use of machine learning with signal- and NLP processing of source code to fingerprint, detect, and classify vulnerabilities and weaknesses with MARFCAT" in http://spectrum.library.concordia.ca/36058/|
Serguei A. Mokhov. The use of machine learning with signal- and NLP processing of source code to fingerprint, detect, and classify vulnerabilities and weaknesses with MARFCAT. Technical Report NIST SP 500-283, NIST, October 2011. Report: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909407, online e-print at http://arxiv.org/abs/1010.2511.
Available Versions of this Item
- MARFCAT 0.0.1 Alpha 2 Application and its Input Data Files for Machine Learning of CVE and CWE Entries. (deposited 05 Jan 2012 17:03) [Currently Displayed]
Repository Staff Only: item control page