Abstract: "The dream of every software development team is to assess the security of their software using
only a tool. In this paper, we attempt to evaluate and quantify the effectiveness of automated source
code analysis tools by comparing such tools to the results of an in-depth manual evaluatio...
Thread
Stories related to "Manual vs. Automated Vulnerability Assessment: A Case Study" across the full archive.
Abstract: "The dream of every software development team is to assess the security of their software using
only a tool. In this paper, we attempt to evaluate and quantify the effectiveness of automated source
code analysis tools by comparing such tools to the results of an in-depth manual evaluatio...
Survey of Automated Vulnerability Detection and Exploit Generation Techniques in C.R.S.'s (2018)
(arxiv.org)
Abstract: "Software is everywhere, from mission critical systems
such as industrial power stations, pacemakers and even household
appliances. This growing dependence on technology and the
increasing complexity software has serious security implications
as it means we are potentially surrounded b...
This booklet showcases the advancements made in enhancing SILE’s math engine up to version 0.15.7+, along with a critical assessment of its current capabilities and the challenges it faces.
Hi HN, Steve here! I'd love to share my recent side project: PlayWord – a tool that makes web automation testing simpler and more intuitive. It converts your natural language test steps into actual, executable actions on the web page.<p>For example, here's a test case I've written:<p>...
Hey HN! Earlier this year my co‑founder and I quit our jobs to start a cybersecurity company and spent a few months in a Space Force‑sponsored accelerator in Colorado Springs. While work‑shopping several ideas we ran a ton of customer‑discovery interviews with DoD and commercial teams.<p>We kept hea...
I got fed up with endless PR reviews and the constant fear of missing a security bug, so I built Shieldcode.<p>What it does:
- Scans new pull requests for bugs and vulnerabilities automatically
- Comments directly on GitHub with clear, actionable feedback
- Works out of the box with no complex setup...
Burned about 1 weeks on this. Not sure if it's useful to anyone beyond my original use case, but figure I'd share.<p>Friend went through a nasty divorce. Had $750k going into the marriage (inheritance), put it in a joint account like an idiot. Five years later, account's been up and d...
Hi HN, I built Radar to give small businesses and MSPs access to real vulnerability scanning without enterprise pricing or long-term contracts.<p>What it does: Enter a domain you own, verify ownership via DNS TXT record, and Radar runs a full scan — subdomain enumeration, DNS recon, port and service...
We built this service and would love honest feedback.