ICST.Table 1: Difference between revisions
Programsam (talk | contribs) No edit summary |
Programsam (talk | contribs) No edit summary |
||
| Line 24: | Line 24: | ||
| 8.42% | | 8.42% | ||
|- | |- | ||
|colspan="3" style="background: #eeeeee" | '''Hypotheses about files''' | |colspan="3" style="background: #eeeeee" | '''Hypotheses† about files''' | ||
|- | |- | ||
| '''H1.''' The more hotspots a file contains per line of code, the more likely it is that the file contains any web application vulnerability. | | '''H1.''' The more hotspots a file contains per line of code, the more likely it is that the file contains any web application vulnerability. | ||
| Line 62: | Line 62: | ||
|- | |- | ||
| colspan=3 style="border-style: solid; border-width: 0 1px 1px 0" | *This finding is consistent with the report from SANS (see Section 1) that indicates that the most popular types of web application attacks are input validation vulnerabilities. | | colspan=3 style="border-style: solid; border-width: 0 1px 1px 0" | *This finding is consistent with the report from SANS (see Section 1) that indicates that the most popular types of web application attacks are input validation vulnerabilities. | ||
†Please note that we use the term "hypothesis" in this table with respect to scientific hypotheses and not statistical hypotheses. | |||
|} | |} | ||