Skip to main content

Software Security Analysis

  • Chapter
  • First Online:
Machine Learning Techniques for Cybersecurity

Abstract

Security of software is still today a critical requirement as a lot of attacks exploit vulnerabilities in code. Securing software is, however, a complex process that requires, among other activities, analyzing the software specification and implementation. Many ML-based techniques or ML-based enhancements of conventional techniques have thus been proposed. In this chapter, we cover ML techniques for static analysis and ML-based fuzzing. We also discuss natural language processing techniques for the analysis of software specifications written in natural language to support different security-related tasks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 49.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elisa Bertino .

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bertino, E. et al. (2023). Software Security Analysis. In: Machine Learning Techniques for Cybersecurity. Synthesis Lectures on Information Security, Privacy, and Trust. Springer, Cham. https://doi.org/10.1007/978-3-031-28259-1_4

Download citation

Publish with us

Policies and ethics