Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery
Several learning-based vulnerability detection methods have been proposed to assist
developers during the secure software development life-cycle. In particular, recent learning …
developers during the secure software development life-cycle. In particular, recent learning …
Semantic-enhanced indirect call analysis with large language models
In contemporary software development, the widespread use of indirect calls to achieve
dynamic features poses challenges in constructing precise control flow graphs (CFGs) …
dynamic features poses challenges in constructing precise control flow graphs (CFGs) …
Analyzing the Impact of Copying-and-Pasting Vulnerable Solidity Code Snippets from Question-and-Answer Websites
K Weiss, C Ferreira Torres, F Wendland - … of the 2024 ACM on Internet …, 2024 - dl.acm.org
Ethereum smart contracts are executable programs deployed on a blockchain. Once
deployed, they cannot be updated due to their inherent immutability. Moreover, they often …
deployed, they cannot be updated due to their inherent immutability. Moreover, they often …
Unsupervised translation of programming language-a survey paper
K Kusum, A Ahmed, C Bhuvana… - 2022 4th International …, 2022 - ieeexplore.ieee.org
Unsupervised translation of Programming Languages has seen a recent boom because of
the need for legacy systems to port to a much more efficient processing system. This has …
the need for legacy systems to port to a much more efficient processing system. This has …
Scalable Defect Detection via Traversal on Code Graph
Z Liu, X Zhong, X Deng, S Hong, X Gao… - arXiv preprint arXiv …, 2024 - arxiv.org
Detecting defects and vulnerabilities in the early stage has long been a challenge in
software engineering. Static analysis, a technique that inspects code without execution, has …
software engineering. Static analysis, a technique that inspects code without execution, has …
CertGraph: Towards a Comprehensive Knowledge Graph for Cloud Security Certifications
This paper introduces CertGraph, a knowledge graph-based approach designed to
streamline security certification which integrates evidence from multiple sources. Unlike …
streamline security certification which integrates evidence from multiple sources. Unlike …
Applying Graph Partitioning-Based Seeding Strategies to Software Modularisation
Software modularisation is a pivotal facet within software engineering, seeking to optimise
the arrangement of software components based on their interrelationships. Despite …
the arrangement of software components based on their interrelationships. Despite …