Mr Janaka Senanayake j.senanayake1@rgu.ac.uk
Lecturer
Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. [Dataset]
Senanayake, Janaka; Kalutarage, Harsha; Al-Kadri, Mhd Omar; Piras, Luca; Petrovski, Andrei
Authors
Dr Harsha Kalutarage h.kalutarage@rgu.ac.uk
Associate Professor
Mhd Omar Al-Kadri
Luca Piras
Andrei Petrovski
Abstract
Many of the Android apps get published without appropriate security considerations, possibly due to not verifying code or not identifying vulnerabilities at the early stages of development. This can be overcome by using an AI based model trained on a properlly labeled dataset. Hence, LVDAndro provides a dataset for Android source code vulnerabilities, labelled based on Common Weakness Enumeration (CWE). The dataset has been generated using code lines scanned from real-world Android apps containing a large amount of distinct source code samples. The dataset can be downloaded from the Dataset directory. There are 3 dataset folders and each contains a readme file with important details and links to download dataset stored in a Google Drive.
Citation
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PIRAS, L. and PETROVSKI, A. 2023. Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models [Dataset]. Hosted on GitHub (online). Available from: https://github.com/softwaresec-labs/LVDAndro
Online Publication Date | Sep 2, 2022 |
---|---|
Publication Date | Sep 2, 2022 |
Deposit Date | Sep 7, 2023 |
Publicly Available Date | Sep 7, 2023 |
Keywords | Android application security; Code vulnerability; Labelled dataset; Artificial intelligence; Auto machine learning |
Public URL | https://rgu-repository.worktribe.com/output/2072071 |
Publisher URL | https://web.archive.org/web/20230907100039/https://github.com/softwaresec-labs/LVDAndro |
Related Public URLs | https://rgu-repository.worktribe.com/output/2072016 (Related conference paper) |
Collection Date | Sep 2, 2022 |
Files
SENANAYAKE 2023 Labelled vulnerability (LINK ONLY)
(2 Kb)
Other
You might also like
Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system.
(2023)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search