Chain-of-thought prompting of large language models for discovering and fixing software vulnerabilities
Security vulnerabilities are increasingly prevalent in modern software and they are widely
consequential to our society. Various approaches to defending against these vulnerabilities …
consequential to our society. Various approaches to defending against these vulnerabilities …
A Catalog of Data Smells for Coding Tasks
A Vitale, R Oliveto, S Scalabrino - ACM Transactions on Software …, 2024 - dl.acm.org
Large Language Models (LLMs) are increasingly becoming fundamental in supporting
software developers in coding tasks. The massive datasets used for training LLMs are often …
software developers in coding tasks. The massive datasets used for training LLMs are often …
MoreFixes: A large-scale dataset of CVE fix commits mined through enhanced repository discovery
J Akhoundali, SR Nouri, K Rietveld… - Proceedings of the 20th …, 2024 - dl.acm.org
Vulnerability datasets have become an important instrument in software security research,
being used to develop automated, machine learning-based vulnerability detection and …
being used to develop automated, machine learning-based vulnerability detection and …
Automated software vulnerability patching using large language models
Timely and effective vulnerability patching is essential for cybersecurity defense, for which
various approaches have been proposed yet still struggle to generate valid and correct …
various approaches have been proposed yet still struggle to generate valid and correct …
Learning to Detect and Localize Multilingual Bugs
Increasing studies have shown bugs in multi-language software as a critical loophole in
modern software quality assurance, especially those induced by language interactions (ie …
modern software quality assurance, especially those induced by language interactions (ie …
A Cross-Silo Vulnerability Federated Learning Approach Based on Content Chunking
W Zhang, J Zhang, S Yu, M Duan… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The proliferation of vulnerable code poses a significant threat to software system security
and user privacy. Given the inefficiency inherent in manual vulnerability analysis, there has …
and user privacy. Given the inefficiency inherent in manual vulnerability analysis, there has …
Exploring RAG-based Vulnerability Augmentation with LLMs
Detecting vulnerabilities is a crucial task for maintaining the integrity, availability, and
security of software systems. Utilizing DL-based models for vulnerability detection has …
security of software systems. Utilizing DL-based models for vulnerability detection has …
Improving VulRepair's Perfect Prediction by Leveraging the LION Optimizer
In current software applications, numerous vulnerabilities may be present. Attackers attempt
to exploit these vulnerabilities, leading to security breaches, unauthorized entry, data theft …
to exploit these vulnerabilities, leading to security breaches, unauthorized entry, data theft …
Enhancing Pre-Trained Language Models for Vulnerability Detection via Semantic-Preserving Data Augmentation
With the rapid development and widespread use of advanced network systems, software
vulnerabilities pose a significant threat to secure communications and networking. Learning …
vulnerabilities pose a significant threat to secure communications and networking. Learning …
Improving Long-Tail Vulnerability Detection Through Data Augmentation Based on Large Language Models
The ability of automatic vulnerability detection models largely depends on the dataset used
for training. However, annotating these datasets is costly and time-consuming, leading to a …
for training. However, annotating these datasets is costly and time-consuming, leading to a …