notesum.ai
Published at November 29Enhancing Security in Third-Party Library Reuse -- Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis
cs.SE
Released Date: November 29, 2024
Authors: Shangzhi Xu1, Jialiang Dong1, Weiting Cai2, Juanru Li3, Arash Shaghaghi1, Nan Sun1, Siqi Ma1
Aff.: 1The University of New South Wales, Sydney, Australia; 2Delft University of Technology, Delft, Netherlands; 3Feiyu Technology International Company Ltd

| Target | DBiot | DBkwd | ||||
| Dtc | Cfm | P | Dtc | Cfm | P | |
| AliOS-Things | 47 | 33 | 0.70 | 61 | 20 | 0.33 |
| LiteOS | 18 | 12 | 0.66 | 19 | 4 | 0.21 |
| Tasmota | 66 | 54 | 0.82 | 63 | 39 | 0.62 |
| TizenRT | 44 | 34 | 0.77 | 51 | 20 | 0.39 |
| kamailio | 7 | 2 | 0.29 | 10 | 2 | 0.20 |
| mbed-os | 17 | 12 | 0.70 | 28 | 10 | 0.36 |
| openthread | 4 | 2 | 0.50 | 4 | 1 | 0.25 |
| Sming | 32 | 24 | 0.75 | 3 | 3 | 1.00 |
| TDengine | 3 | 3 | 1.00 | 4 | 2 | 0.50 |
| zephyr | 2 | 2 | 1.00 | 5 | 1 | 0.20 |
| Total | 240 | 178 | 0.74 | 248 | 102 | 0.41 |