[HTML][HTML] Model-based security testing in IoT systems: A Rapid Review

F Lonetti, A Bertolino, F Di Giandomenico - Information and Software …, 2023 - Elsevier
Context: Security testing is a challenging and effort-demanding task in IoT scenarios. The
heterogeneous devices expose different vulnerabilities that can influence the methods and …

Multi-target backdoor attacks for code pre-trained models

Y Li, S Liu, K Chen, X Xie, T Zhang, Y Liu - arXiv preprint arXiv …, 2023 - arxiv.org
Backdoor attacks for neural code models have gained considerable attention due to the
advancement of code intelligence. However, most existing works insert triggers into task …

[HTML][HTML] A natural language interface for automatic generation of data flow diagram using web extraction techniques

SM Cheema, S Tariq, IM Pires - Journal of King Saud University-Computer …, 2023 - Elsevier
To model the data and functions in various computer science applications, the researcher
uses a Data Flow Diagram (DFD). DFD has been constructed using [open-source software …

Review efforts reduction by partitioning of static analysis warnings

TB Muske, A Baid, T Sanas - 2013 IEEE 13th International …, 2013 - ieeexplore.ieee.org
Static analysis has been successfully employed in software verification, however the number
of generated warnings and cost incurred in their manual review is a major concern. In this …

[PDF][PDF] K-Miner: Uncovering Memory Corruption in Linux.

D Gens, S Schmitt, L Davi, AR Sadeghi - NDSS, 2018 - ndss-symposium.org
Operating system kernels are appealing attack targets: compromising the kernel usually
allows attackers to bypass all deployed security mechanisms and take control over the entire …

SpongeBugs: Automatically generating fix suggestions in response to static code analysis warnings

D Marcilio, CA Furia, R Bonifácio, G Pinto - Journal of Systems and …, 2020 - Elsevier
Static code analysis tools such as FindBugs and SonarQube are widely used on open-
source and industrial projects to detect a variety of issues that may negatively affect the …

Gas estimation and optimization for smart contracts on ethereum

C Li - 2021 36th IEEE/ACM International Conference on …, 2021 - ieeexplore.ieee.org
When users deploy or invoke smart contracts on Ethereum, a fee is charged for avoiding
resource abuse. Metered in gas, the fee is the product of the amount of gas used and the …

Identification of dependency-based attacks on node. js

B Pfretzschner, L ben Othmane - … of the 12th international conference on …, 2017 - dl.acm.org
Node. js executes server-side JavaScript-based code. By design Node. js and JavaScript
support global variables, monkey-patching, and shared cache of loaded modules. This …

The bounded pathwidth of control-flow graphs

GK Conrado, AK Goharshady, CK Lam - Proceedings of the ACM on …, 2023 - dl.acm.org
Pathwidth and treewidth are standard and well-studied graph sparsity parameters which
intuitively model the degree to which a given graph resembles a path or a tree, respectively …

[HTML][HTML] BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)

S Alrabaee, L Wang, M Debbabi - Digital Investigation, 2016 - Elsevier
Binary analysis is useful in many practical applications, such as the detection of malware or
vulnerable software components. However, our survey of the literature shows that most …