State-of-the-Art in Software Security Visualization: A Systematic Review
- URL: http://arxiv.org/abs/2509.20385v1
- Date: Mon, 22 Sep 2025 09:21:30 GMT
- Title: State-of-the-Art in Software Security Visualization: A Systematic Review
- Authors: Ishara Devendra, Chaman Wijesiriwardana, Prasad Wimalaratne,
- Abstract summary: Software security visualization combines the technical complexity of cybersecurity, including threat intelligence and compliance monitoring, with visual analytics.<n>Traditional text-based and numerical methods for analyzing and interpreting security concerns become increasingly ineffective.<n>This systematic review explores over 60 recent key research papers in software security visualization.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Software security visualization is an interdisciplinary field that combines the technical complexity of cybersecurity, including threat intelligence and compliance monitoring, with visual analytics, transforming complex security data into easily digestible visual formats. As software systems get more complex and the threat landscape evolves, traditional text-based and numerical methods for analyzing and interpreting security concerns become increasingly ineffective. The purpose of this paper is to systematically review existing research and create a comprehensive taxonomy of software security visualization techniques through literature, categorizing these techniques into four types: graph-based, notation-based, matrix-based, and metaphor-based visualization. This systematic review explores over 60 recent key research papers in software security visualization, highlighting its key issues, recent advancements, and prospective future research directions. From the comprehensive analysis, the two main areas were distinctly highlighted as extensive software development visualization, focusing on advanced methods for depicting software architecture: operational security visualization and cybersecurity visualization. The findings highlight the necessity for innovative visualization techniques that adapt to the evolving security landscape, with practical implications for enhancing threat detection, improving security response strategies, and guiding future research.
Related papers
- A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives [65.3369988566853]
Recent studies have demonstrated that adversaries can replicate a target model's functionality.<n>Model Extraction Attacks pose threats to intellectual property, privacy, and system security.<n>We propose a novel taxonomy that classifies MEAs according to attack mechanisms, defense approaches, and computing environments.
arXiv Detail & Related papers (2025-08-20T19:49:59Z) - A Systematic Literature Review on Detecting Software Vulnerabilities with Large Language Models [2.518519330408713]
Large Language Models (LLMs) in software engineering have sparked interest in their use for software vulnerability detection.<n>The rapid development of this field has resulted in a fragmented research landscape.<n>This fragmentation makes it difficult to obtain a clear overview of the state-of-the-art or compare and categorize studies meaningfully.
arXiv Detail & Related papers (2025-07-30T13:17:16Z) - Information Security Based on LLM Approaches: A Review [3.292159069489852]
Large language models (LLMs) have shown a broad application prospect in the field of information security.<n>Based on neural networks and Transformer architecture, this paper analyzes the technical basis of large language models.<n>It is shown that the introduction of large language modeling helps to improve the detection accuracy and reduce the false alarm rate of security systems.
arXiv Detail & Related papers (2025-07-24T09:09:36Z) - SoK: Advances and Open Problems in Web Tracking [71.54586748169943]
Web tracking is a pervasive and opaque practice that enables personalized advertising, and conversion tracking.<n>Web tracking is undergoing a once-in-a-generation transformation driven by shifts in the advertising industry, the adoption of anti-tracking countermeasures by browsers, and the growing enforcement of emerging privacy regulations.<n>This Systematization of Knowledge (SoK) aims to consolidate and synthesize this wide-ranging research, offering a comprehensive overview of the technical mechanisms, countermeasures, and regulations that shape the modern and rapidly evolving web tracking landscape.
arXiv Detail & Related papers (2025-06-16T23:30:54Z) - Security through the Eyes of AI: How Visualization is Shaping Malware Detection [12.704411714353787]
We evaluate existing visualization-based approaches applied to malware detection and classification.<n>Within this framework, we analyze state-of-the-art approaches across the critical stages of the malware detection pipeline.<n>We shed light on the main challenges in visualization-based approaches and provide insights into the advancements and potential future directions in this critical field.
arXiv Detail & Related papers (2025-05-12T13:53:56Z) - A Survey on (M)LLM-Based GUI Agents [62.57899977018417]
Graphical User Interface (GUI) Agents have emerged as a transformative paradigm in human-computer interaction.<n>Recent advances in large language models and multimodal learning have revolutionized GUI automation across desktop, mobile, and web platforms.<n>This survey identifies key technical challenges, including accurate element localization, effective knowledge retrieval, long-horizon planning, and safety-aware execution control.
arXiv Detail & Related papers (2025-03-27T17:58:31Z) - Software Vulnerability Analysis Across Programming Language and Program Representation Landscapes: A Survey [9.709395737136006]
This article systematically examines programming languages, levels of program representation, categories of vulnerabilities, and detection techniques.<n>It provides a detailed understanding of current practices in vulnerability discovery, highlighting their strengths, limitations, and distinguishing characteristics.<n>It outlines promising directions for future research in the field of software security.
arXiv Detail & Related papers (2025-03-26T05:22:48Z) - Charting a Path to Efficient Onboarding: The Role of Software
Visualization [49.1574468325115]
The present study aims to explore the familiarity of managers, leaders, and developers with software visualization tools.
This approach incorporated quantitative and qualitative analyses of data collected from practitioners using questionnaires and semi-structured interviews.
arXiv Detail & Related papers (2024-01-17T21:30:45Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Towards an Improved Understanding of Software Vulnerability Assessment
Using Data-Driven Approaches [0.0]
The thesis advances the field of software security by providing knowledge and automation support for software vulnerability assessment.
The key contributions include a systematisation of knowledge, along with a suite of novel data-driven techniques.
arXiv Detail & Related papers (2022-07-24T10:22:28Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.