Software Vulnerability Analysis Across Programming Language and Program Representation Landscapes: A Survey

📅 2025-03-26
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Current cross-language software vulnerability detection research lacks systematic comparative analysis, and the interrelationships among programming languages, program representations, vulnerability types, and analysis techniques—and associated domain limitations—remain poorly understood. To address this, we propose the first unified analytical framework encompassing multiple programming languages, abstraction levels (source code, intermediate representation, and binary), vulnerability categories (e.g., memory corruption, injection, logic flaws), and detection paradigms (static/dynamic analysis, symbolic execution, ML-driven methods). Leveraging bibliometric analysis, taxonomy modeling, and cross-study comparison, we identify common technical challenges and critical methodological gaps. Our work yields a comprehensive technology landscape and pinpoints twelve key research gaps, thereby providing theoretical foundations and practical guidance for designing cross-language vulnerability detection tools, establishing evaluation benchmarks, and charting future research directions.

Technology Category

Application Category

📝 Abstract
Modern software systems are developed in diverse programming languages and often harbor critical vulnerabilities that attackers can exploit to compromise security. These vulnerabilities have been actively targeted in real-world attacks, causing substantial harm to users and cyberinfrastructure. Since many of these flaws originate from the code itself, a variety of techniques have been proposed to detect and mitigate them prior to software deployment. However, a comprehensive comparative study that spans different programming languages, program representations, bug types, and analysis techniques is still lacking. As a result, the relationships among programming languages, abstraction levels, vulnerability types, and detection approaches remain fragmented, and the limitations and research gaps across the landscape are not clearly understood. This article aims to bridge that gap by systematically examining widely used programming languages, levels of program representation, categories of vulnerabilities, and mainstream detection techniques. The survey provides a detailed understanding of current practices in vulnerability discovery, highlighting their strengths, limitations, and distinguishing characteristics. Furthermore, it identifies persistent challenges and outlines promising directions for future research in the field of software security.
Problem

Research questions and friction points this paper is trying to address.

Analyzing software vulnerabilities across diverse programming languages
Comparing detection techniques for different vulnerability types
Identifying research gaps in software security analysis methods
Innovation

Methods, ideas, or system contributions that make the work stand out.

Survey across diverse programming languages
Analyzes multiple program representation levels
Compares mainstream vulnerability detection techniques
🔎 Similar Papers
No similar papers found.
Z
Zhuoyun Qian
Montana State University, USA
Fangtian Zhong
Fangtian Zhong
Assistant Prof. @ Montana State University
Software SecuritySystem Security
Q
Qin Hu
Georgia State University, USA
Y
Yili Jiang
Georgia State University, USA
Jiaqi Huang
Jiaqi Huang
University of Central Missouri
CybersecurityIoV
Mengfei Ren
Mengfei Ren
Assistant Professor of CS at Baylor University
Software TestingCybersecurityFuzzingIoT Wireless Protocol
J
Jiguo Yu
Universtiy of Electronic Science and Technology of China, China