Predictive models in software engineering: Challenges and opportunities

Y Yang, X Xia, D Lo, T Bi, J Grundy… - ACM Transactions on …, 2022 - dl.acm.org
Predictive models are one of the most important techniques that are widely applied in many
areas of software engineering. There have been a large number of primary studies that …

Learning to detect memory-related vulnerabilities

S Cao, X Sun, L Bo, R Wu, B Li, X Wu, C Tao… - ACM Transactions on …, 2023 - dl.acm.org
Memory-related vulnerabilities can result in performance degradation or even program
crashes, constituting severe threats to the security of modern software. Despite the …

Goshawk: Hunting memory corruptions via structure-aware and object-centric memory operation synopsis

Y Lyu, Y Fang, Y Zhang, Q Sun, S Ma… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Existing tools for the automated detection of memory corruption bugs are not very effective in
practice. They typically recognize only standard memory management (MM) APIs (eg …

Detecting {API}{Post-Handling} Bugs Using Code and Description in Patches

M Lin, K Chen, Y Xiao - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Program APIs must be used in accordance with their specifications. API post-handling (APH)
is a common type of specification that deals with APIs' return checks, resource releases, etc …

Boosting Static Resource Leak Detection via LLM-based Resource-Oriented Intention Inference

C Wang, J Liu, X Peng, Y Liu, Y Lou - arXiv preprint arXiv:2311.04448, 2023 - arxiv.org
Resource leaks, caused by resources not being released after acquisition, often lead to
performance issues and system crashes. Existing static detection techniques rely on …

bjXnet: an improved bug localization model based on code property graph and attention mechanism

J Han, C Huang, S Sun, Z Liu, J Liu - Automated Software Engineering, 2023 - Springer
Bug localization technologies and tools are widely used in software engineering. Although
state-of-the-art methods have achieved great progress, they only consider the source code …

Detecting kernel memory bugs through inconsistent memory management intention inferences

D Liu, Z Lu, S Ji, K Lu, J Chen, Z Liu, D Liu… - 33rd USENIX Security …, 2024 - usenix.org
Modern operating system kernels, typically written in low-level languages such as C and
C++, are tasked with managing extensive memory resources. Memory-related errors, such …

AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation

A Küchler, L Wenning, F Wendland - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
In the past years, the CWE-190 integer overflow led to many vulnerabilities. Program
verification techniques such as Abstract Interpretation can show that no such bug is present …

Mining resource-operation knowledge to support resource leak detection

C Wang, Y Lou, X Peng, J Liu, B Zou - … of the 31st ACM Joint European …, 2023 - dl.acm.org
Resource leaks, which are caused by acquired resources not being released, often result in
performance degradation and system crashes. Resource leak detection relies on two …

Do Language Models Learn Semantics of Code? A Case Study in Vulnerability Detection

B Steenhoek, MM Rahman, S Sharmin… - arXiv preprint arXiv …, 2023 - arxiv.org
Recently, pretrained language models have shown state-of-the-art performance on the
vulnerability detection task. These models are pretrained on a large corpus of source code …