Codeplan: Repository-level coding using llms and planning

R Bairi, A Sonwane, A Kanade, A Iyer… - Proceedings of the …, 2024 - dl.acm.org
Software engineering activities such as package migration, fixing error reports from static
analysis or testing, and adding type annotations or other specifications to a codebase …

Deepsim: deep learning code functional similarity

G Zhao, J Huang - Proceedings of the 2018 26th ACM joint meeting on …, 2018 - dl.acm.org
Measuring code similarity is fundamental for many software engineering tasks, eg, code
search, refactoring and reuse. However, most existing techniques focus on code syntactical …

{Under-Constrained} symbolic execution: Correctness checking for real code

DA Ramos, D Engler - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection

L Luo, J Ming, D Wu, P Liu, S Zhu - Proceedings of the 22nd ACM …, 2014 - dl.acm.org
Existing code similarity comparison methods, whether source or binary code based, are
mostly not resilient to obfuscations. In the case of software plagiarism, emerging obfuscation …

Ironclad apps:{End-to-End} security via automated {Full-System} verification

C Hawblitzel, J Howell, JR Lorch, A Narayan… - … USENIX Symposium on …, 2014 - usenix.org
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …

Similarity of binaries through re-optimization

Y David, N Partush, E Yahav - Proceedings of the 38th ACM SIGPLAN …, 2017 - dl.acm.org
We present a scalable approach for establishing similarity between stripped binaries (with
no debug information). The main challenge in binary similarity, is to establish similarity even …

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection

L Luo, J Ming, D Wu, P Liu, S Zhu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Existing code similarity comparison methods, whether source or binary code based, are
mostly not resilient to obfuscations. Identifying similar or identical code fragments among …

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

D Kim, E Kim, SK Cha, S Son… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …

Automating regression verification

D Felsing, S Grebing, V Klebanov, P Rümmer… - Proceedings of the 29th …, 2014 - dl.acm.org
Regression verification is an approach complementing regression testing with formal
verification. The goal is to formally prove that two versions of a program behave either …

Semantic program repair using a reference implementation

S Mechtaev, MD Nguyen, Y Noller, L Grunske… - Proceedings of the 40th …, 2018 - dl.acm.org
Automated program repair has been studied via the use of techniques involving search,
semantic analysis and artificial intelligence. Most of these techniques rely on tests as the …