ICST.Table 1: Difference between revisions

No edit summary
No edit summary
Line 24: Line 24:
| 8.42%
| 8.42%
|-
|-
|colspan="3" style="background: #eeeeee" | '''Hypotheses about files'''
|colspan="3" style="background: #eeeeee" | '''Hypotheses† about files'''
|-
|-
| '''H1.''' The more hotspots a file contains per line of code, the more likely it is that the file contains any web application vulnerability.
| '''H1.''' The more hotspots a file contains per line of code, the more likely it is that the file contains any web application vulnerability.
Line 62: Line 62:
|-
|-
| colspan=3 style="border-style: solid; border-width: 0 1px 1px 0" | *This finding is consistent with the report from SANS (see Section 1) that indicates that the most popular types of web application attacks are input validation vulnerabilities.
| colspan=3 style="border-style: solid; border-width: 0 1px 1px 0" | *This finding is consistent with the report from SANS (see Section 1) that indicates that the most popular types of web application attacks are input validation vulnerabilities.
Please note that we use the term "hypothesis" in this table with respect to scientific hypotheses and not statistical hypotheses.
†Please note that we use the term "hypothesis" in this table with respect to scientific hypotheses and not statistical hypotheses.


|}
|}