Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge

S Yang, C Dong, Y **ao, Y Cheng, Z Shi, Z Li… - ACM Transactions on …, 2023 - dl.acm.org
Widespread code reuse allows vulnerabilities to proliferate among a vast variety of firmware.
There is an urgent need to detect these vulnerable codes effectively and efficiently. By …

{MOVERY}: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified {Open-Source} Software Components

S Woo, H Hong, E Choi, H Lee - 31st USENIX Security Symposium …, 2022 - usenix.org
Vulnerabilities inherited from third-party open-source software (OSS) components can
compromise the entire software security. However, discovering propagated vulnerable code …

Vision: Identifying affected library versions for open source software vulnerabilities

S Wu, R Wang, K Huang, Y Cao, W Song… - Proceedings of the 39th …, 2024 - dl.acm.org
Vulnerability reports play a crucial role in mitigating open-source software risks. Typically,
the vulnerability report contains affected versions of a software. However, despite the …

VMUD: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching

K Huang, C Lu, Y Cao, B Chen, X Peng - … of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
The widespread use of open-source software (OSS) has led to extensive code reuse,
making vulnerabilities in OSS significantly pervasive. The vulnerabilities due to code reuse …

LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions

Y Cheng, LK Shar, T Zhang, S Yang, C Dong… - arxiv preprint arxiv …, 2024 - arxiv.org
Open-source software (OSS) has experienced a surge in popularity, attributed to its
collaborative development model and cost-effective nature. However, the adoption of …

{V1SCAN}: Discovering 1-day Vulnerabilities in Reused {C/C++} Open-source Software Components Using Code Classification Techniques

S Woo, E Choi, H Lee, H Oh - 32nd USENIX Security Symposium …, 2023 - usenix.org
We present V1SCAN, an effective approach for discovering 1-day vulnerabilities in reused
C/C++ open-source software (OSS) components. Reusing third-party OSS has many …

xVDB: A high-coverage approach for constructing a vulnerability database

H Hong, S Woo, E Choi, J Choi, H Lee - IEEE Access, 2022 - ieeexplore.ieee.org
Security patches play an important role in detecting and fixing one-day vulnerabilities.
However, collecting abundant security patches from diverse data sources is not a simple …

{FIRE}: Combining {Multi-Stage} Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection

S Feng, Y Wu, W Xue, S Pan, D Zou, Y Liu… - 33rd USENIX Security …, 2024 - usenix.org
With the continuous development of software open-sourcing, the reuse of open-source
software has led to a significant increase in the occurrence of recurring vulnerabilities …

Benchmarking Software Vulnerability Detection Techniques: A Survey

Y Bi, J Huang, P Liu, L Wang - arxiv preprint arxiv:2303.16362, 2023 - arxiv.org
Software vulnerabilities can have serious consequences, which is why many techniques
have been proposed to defend against them. Among these, vulnerability detection …

Dicos: Discovering insecure code snippets from stack overflow posts by leveraging user discussions

H Hong, S Woo, H Lee - Proceedings of the 37th Annual Computer …, 2021 - dl.acm.org
Online Q&A fora such as Stack Overflow assist developers to solve their faced coding
problems. Despite the advantages, Stack Overflow has the potential to provide insecure …