AI Techniques for Software Vulnerability Detection and Mitigation

Heba M. Khater, Mohamad Khayat, Saed Alrabaee, Mohamed Serhani, Ezedin Barka, Farag Sallabi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The growth of the Internet of Things (IoT) is leading to some restructuring and transformation of everyday lives. The number and diversity of IoT devices have increased rapidly, enabling the vision of a smarter environment and opening the door to further automation, accompanied by the generation and collection of enormous amounts of data. The automation and ongoing proliferation of personal and professional data in the IoT have resulted in countless cyber-Attacks enabled by the growing security vulnerabilities of IoT devices. Therefore, it is crucial to detect and patch vulnerabilities before attacks happen in order to secure IoT environments. One of the most promising approaches for combating cybersecurity vulnerabilities and ensuring security is through the use of artificial intelligence (AI). In this paper, we provide a review in which we classify, map, and summarize the available literature on AI techniques used to recognize and reduce cybersecurity software vulnerabilities in the IoT. We present a thorough analysis of the majority of AI trends in cybersecurity, as well as cutting-edge solutions.

Original languageEnglish
Title of host publicationProceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350382112
DOIs
Publication statusPublished - 2023
Event6th IEEE Conference on Dependable and Secure Computing, DSC 2023 - Tampa, United States
Duration: Nov 7 2023Nov 9 2023

Publication series

NameProceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023

Conference

Conference6th IEEE Conference on Dependable and Secure Computing, DSC 2023
Country/TerritoryUnited States
CityTampa
Period11/7/2311/9/23

Keywords

  • Artificial Intelligence (AI)
  • Internet of Things (IoT)
  • Vulnerability Detection

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'AI Techniques for Software Vulnerability Detection and Mitigation'. Together they form a unique fingerprint.

Cite this