TY - JOUR AU - Sabetta, Antonino AU - Ponta, Serena Elisa AU - Lozoya, Rocio Cabrera AU - Bezzi, Michele AU - Sacchetti, Tommaso AU - Greco, Matteo AU - Balogh, Gergő AU - Hegedűs, Péter AU - Ferenc, Rudolf AU - Paramitha, Ranindya AU - Pashchenko, Ivan AU - Papotti, Aurora AU - Milánkovich, Ákos AU - Massacci, Fabio TI - Known Vulnerabilities of Open Source Projects: Where Are the Fixes? JF - IEEE SECURITY & PRIVACY J2 - IEEE SECUR PRIV PY - 2024 PG - 11 SN - 1540-7993 DO - 10.1109/MSEC.2023.3343836 UR - https://m2.mtmt.hu/api/publication/34499877 ID - 34499877 LA - English DB - MTMT ER - TY - JOUR AU - Gazdag, András Gábor AU - Ferenc, Rudolf AU - Buttyán, Levente TI - CrySyS dataset of CAN traffic logs containing fabrication and masquerade attacks JF - SCIENTIFIC DATA J2 - SCI DATA VL - 10 PY - 2023 IS - 1 PG - 11 SN - 2052-4463 DO - 10.1038/s41597-023-02716-9 UR - https://m2.mtmt.hu/api/publication/34448268 ID - 34448268 N1 - CrySyS Lab, Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, Hungary Department of Software Engineering, University of Szeged, Szeged, Hungary Export Date: 22 December 2023 Correspondence Address: Gazdag, A.; CrySyS Lab, Hungary; email: andras.gazdag@crysys.hu Funding details: Mesterséges Intelligencia Nemzeti Laboratórium, MILAB, 138903 Funding details: European Commission, EC, RRF-2.3.1-21-2022-00004 Funding details: Nemzeti Kutatási, Fejlesztési és Innovaciós Alap, NKFIA Funding text 1: This work has been supported by the European Union project RRF-2.3.1-21-2022-00004 within the framework of the Artificial Intelligence National Laboratory and Project no. 138903 implemented with the support provided by the Ministry of Innovation and Technology from the National Research, Development, and Innovation Fund, financed under the FK_21 funding scheme. AB - Despite their known security shortcomings, Controller Area Networks are widely used in modern vehicles. Research in the field has already proposed several solutions to increase the security of CAN networks, such as using anomaly detection methods to identify attacks. Modern anomaly detection procedures typically use machine learning solutions that require a large amount of data to be trained. This paper presents a novel CAN dataset specifically collected and generated to support the development of machine learning based anomaly detection systems. Our dataset contains 26 recordings of benign network traffic, amounting to more than 2.5 hours of traffic. We performed two types of attack on the benign data to create an attacked dataset representing most of the attacks previously proposed in the academic literature. As a novelty, we performed all attacks in two versions, modifying either one or two signals simultaneously. Along with the raw data, we also publish the source code used to generate the attacks to allow easy customization and extension of the dataset. © 2023, The Author(s). LA - English DB - MTMT ER - TY - CHAP AU - Aladics, Tamás AU - Hegedűs, Péter AU - Ferenc, Rudolf ED - Fill, Hans-Georg ED - van Sinderen, Marten ED - Maciaszek, Leszek A. TI - An AST-Based Code Change Representation and Its Performance in Just-in-Time Vulnerability Prediction T2 - Software Technologies PB - Springer Nature Switzerland AG CY - Cham SN - 9783031372315 T3 - Communications in Computer and Information Science, ISSN 1865-0929 ; 1859. PY - 2023 SP - 169 EP - 186 PG - 18 DO - 10.1007/978-3-031-37231-5_8 UR - https://m2.mtmt.hu/api/publication/34066580 ID - 34066580 LA - English DB - MTMT ER - TY - JOUR AU - Antal, Gábor AU - Hegedűs, Péter AU - Herczeg, Zoltán AU - Lóki, Gábor AU - Ferenc, Rudolf TI - Is JavaScript Call Graph Extraction Solved Yet? A Comparative Study of Static and Dynamic Tools JF - IEEE ACCESS J2 - IEEE ACCESS VL - 11 PY - 2023 SP - 25266 EP - 25284 PG - 22 SN - 2169-3536 DO - 10.1109/ACCESS.2023.3255984 UR - https://m2.mtmt.hu/api/publication/33695960 ID - 33695960 LA - English DB - MTMT ER - TY - CHAP AU - Rozsa, Balazs AU - Antal, Gábor AU - Ferenc, Rudolf ED - Mariano, Ceccato ED - Banani, Roy ED - Mohammad, Ghafari TI - Don't DIY: Automatically transform legacy Python code to support structural pattern matching T2 - Proceedings of the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation PB - IEEE Computer Society Conference Publishing Services (CPS) CY - Washington DC CY - Tokyo CY - Los Alamitos (CA) SN - 9781665496094 PY - 2022 SP - 164 EP - 169 PG - 6 DO - 10.1109/SCAM55253.2022.00024 UR - https://m2.mtmt.hu/api/publication/33573801 ID - 33573801 N1 - Export Date: 27 February 2023 LA - English DB - MTMT ER - TY - CHAP AU - Jász, Judit AU - Hegedűs, Péter AU - Milánkovich, Ákos AU - Ferenc, Rudolf ED - Mariano, Ceccato ED - Banani, Roy ED - Mohammad, Ghafari TI - An End-to-End Framework for Repairing Potentially Vulnerable Source Code T2 - Proceedings of the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation PB - IEEE Computer Society Conference Publishing Services (CPS) CY - Washington DC CY - Tokyo CY - Los Alamitos (CA) SN - 9781665496094 PY - 2022 SP - 242 EP - 247 PG - 6 DO - 10.1109/SCAM55253.2022.00034 UR - https://m2.mtmt.hu/api/publication/33550532 ID - 33550532 LA - English DB - MTMT ER - TY - JOUR AU - Ságodi, Zoltán AU - Pengő, Edit AU - Jász, Judit AU - Siket, István AU - Ferenc, Rudolf TI - Static Call Graph Combination to Simulate Dynamic Call Graph Behavior JF - IEEE ACCESS J2 - IEEE ACCESS VL - 10 PY - 2022 SP - 131829 EP - 131840 PG - 12 SN - 2169-3536 DO - 10.1109/ACCESS.2022.3229182 UR - https://m2.mtmt.hu/api/publication/33547978 ID - 33547978 N1 - Correspondence Address: Jasz, J.; University of Szeged, Hungary; email: jasy@inf.u-szeged.hu LA - English DB - MTMT ER - TY - JOUR AU - Mosolygó, Balázs AU - Vándor, Norbert Rudolf AU - Hegedűs, Péter AU - Ferenc, Rudolf TI - A Line-Level Explainable Vulnerability Detection Approach for Java JF - LECTURE NOTES IN COMPUTER SCIENCE J2 - LECT NOTES COMPUT SC VL - 13380 PY - 2022 SP - 106 EP - 122 PG - 17 SN - 0302-9743 DO - 10.1007/978-3-031-10542-5_8 UR - https://m2.mtmt.hu/api/publication/33038183 ID - 33038183 N1 - A sorozat rendelkezik SJR értékkel a publikáció megjelenési évében, ezért besorolása szakcikk. LA - English DB - MTMT ER - TY - CHAP AU - Aladics, Tamás AU - Hegedűs, Péter AU - Ferenc, Rudolf ED - Hans-Georg, Fill ED - Marten, van Sinderen ED - Leszek, Maciaszek TI - A Vulnerability Introducing Commit Dataset for Java: An Improved SZZ based Approach T2 - Proceedings of the 17th International Conference on Software Technologies PB - SciTePress CY - Setubal SN - 9789897585883 T3 - ICSOFT - International Conference on Software Technologies, ISSN 2184-2833 PY - 2022 SP - 68 EP - 78 PG - 11 DO - 10.5220/0011275200003266 UR - https://m2.mtmt.hu/api/publication/33036709 ID - 33036709 LA - English DB - MTMT ER - TY - JOUR AU - Hegedűs, Péter AU - Ferenc, Rudolf TI - Static Code Analysis Alarms Filtering Reloaded: A New Real-World Dataset and its ML-Based Utilization JF - IEEE ACCESS J2 - IEEE ACCESS VL - 10 PY - 2022 SP - 55090 EP - 55101 PG - 12 SN - 2169-3536 DO - 10.1109/ACCESS.2022.3176865 UR - https://m2.mtmt.hu/api/publication/32863084 ID - 32863084 LA - English DB - MTMT ER -