Exploring foci of:
Proceedings of the ACM on software engineering. • Vol 2 • No ISSTA
Recurring Vulnerability Detection: How Far Are We?
June 2025 • Yuhua Cao, Susheng Wu, Ruisi Wang, Bihuan Chen, Yiheng Huang, Chenhao Lu, Zhuotong Zhou, Xin Peng
With the rapid development of open-source software, code reuse has become a common practice to accelerate development. However, it leads to inheritance from the original vulnerability, which recurs at the reusing projects, known as recurring vulnerabilities (RVs). Traditional general-purpose vulnerability detection approaches struggle with scalability and adaptability, while learning-based approaches are often constrained by limited training datasets and are less effective against unseen vulnerabilities. Though sp…
Computer Science
Reuse
Lock And Key
Machine Learning
Data Mining
Artificial Intelligence
Computer Security
Engineering
Statistics
Combinatorics
Programming Language
Database
Ecology
Waste Management
Biology
Mathematics