[HTML][HTML] Model-based security testing in IoT systems: A Rapid Review
F Lonetti, A Bertolino, F Di Giandomenico - Information and Software …, 2023 - Elsevier
Context: Security testing is a challenging and effort-demanding task in IoT scenarios. The
heterogeneous devices expose different vulnerabilities that can influence the methods and …
heterogeneous devices expose different vulnerabilities that can influence the methods and …
Multi-target backdoor attacks for code pre-trained models
Backdoor attacks for neural code models have gained considerable attention due to the
advancement of code intelligence. However, most existing works insert triggers into task …
advancement of code intelligence. However, most existing works insert triggers into task …
[HTML][HTML] A natural language interface for automatic generation of data flow diagram using web extraction techniques
To model the data and functions in various computer science applications, the researcher
uses a Data Flow Diagram (DFD). DFD has been constructed using [open-source software …
uses a Data Flow Diagram (DFD). DFD has been constructed using [open-source software …
Review efforts reduction by partitioning of static analysis warnings
TB Muske, A Baid, T Sanas - 2013 IEEE 13th International …, 2013 - ieeexplore.ieee.org
Static analysis has been successfully employed in software verification, however the number
of generated warnings and cost incurred in their manual review is a major concern. In this …
of generated warnings and cost incurred in their manual review is a major concern. In this …
[PDF][PDF] K-Miner: Uncovering Memory Corruption in Linux.
Operating system kernels are appealing attack targets: compromising the kernel usually
allows attackers to bypass all deployed security mechanisms and take control over the entire …
allows attackers to bypass all deployed security mechanisms and take control over the entire …
SpongeBugs: Automatically generating fix suggestions in response to static code analysis warnings
Static code analysis tools such as FindBugs and SonarQube are widely used on open-
source and industrial projects to detect a variety of issues that may negatively affect the …
source and industrial projects to detect a variety of issues that may negatively affect the …
Gas estimation and optimization for smart contracts on ethereum
C Li - 2021 36th IEEE/ACM International Conference on …, 2021 - ieeexplore.ieee.org
When users deploy or invoke smart contracts on Ethereum, a fee is charged for avoiding
resource abuse. Metered in gas, the fee is the product of the amount of gas used and the …
resource abuse. Metered in gas, the fee is the product of the amount of gas used and the …
Identification of dependency-based attacks on node. js
B Pfretzschner, L ben Othmane - … of the 12th international conference on …, 2017 - dl.acm.org
Node. js executes server-side JavaScript-based code. By design Node. js and JavaScript
support global variables, monkey-patching, and shared cache of loaded modules. This …
support global variables, monkey-patching, and shared cache of loaded modules. This …
The bounded pathwidth of control-flow graphs
GK Conrado, AK Goharshady, CK Lam - Proceedings of the ACM on …, 2023 - dl.acm.org
Pathwidth and treewidth are standard and well-studied graph sparsity parameters which
intuitively model the degree to which a given graph resembles a path or a tree, respectively …
intuitively model the degree to which a given graph resembles a path or a tree, respectively …
[HTML][HTML] BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
Binary analysis is useful in many practical applications, such as the detection of malware or
vulnerable software components. However, our survey of the literature shows that most …
vulnerable software components. However, our survey of the literature shows that most …