VulRepair: a T5-based automated software vulnerability repair

M Fu, C Tantithamthavorn, T Le, V Nguyen… - Proceedings of the 30th …, 2022 - dl.acm.org
As software vulnerabilities grow in volume and complexity, researchers proposed various
Artificial Intelligence (AI)-based approaches to help under-resourced security analysts to …

Vulexplainer: A transformer-based hierarchical distillation for explaining vulnerability types

M Fu, V Nguyen, CK Tantithamthavorn… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Deep learning-based vulnerability prediction approaches are proposed to help under-
resourced security practitioners to detect vulnerable functions. However, security …

How about bug-triggering paths?-understanding and characterizing learning-based vulnerability detectors

X Cheng, X Nie, N Li, H Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning and its promising branch deep learning have proven to be effective in a
wide range of application domains. Recently, several efforts have shown success in …

Vision transformer inspired automated vulnerability repair

M Fu, V Nguyen, C Tantithamthavorn… - ACM Transactions on …, 2024 - dl.acm.org
Recently, automated vulnerability repair approaches have been widely adopted to combat
increasing software security issues. In particular, transformer-based encoder-decoder …

AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities

M Fu, C Tantithamthavorn, T Le, Y Kume… - Empirical Software …, 2024 - Springer
Abstract Many Machine Learning (ML)-based approaches have been proposed to
automatically detect, localize, and repair software vulnerabilities. While ML-based methods …

Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding

Z Tian, B Tian, J Lv, Y Chen, L Chen - Expert Systems with Applications, 2024 - Elsevier
The explosive growth of software vulnerabilities poses a serious threat to the system security
and has become one of the urgent problems of the day. However, existing vulnerability …

On the use of fine-grained vulnerable code statements for software vulnerability assessment models

THM Le, MA Babar - Proceedings of the 19th International Conference …, 2022 - dl.acm.org
Many studies have developed Machine Learning (ML) approaches to detect Software
Vulnerabilities (SVs) in functions and fine-grained code statements that cause such SVs …

An unbiased transformer source code learning with semantic vulnerability graph

NT Islam, GDLT Parra, D Manuel… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Over the years, open-source software systems have become prey to threat actors. Even
highly-adopted software has been crippled by unforeseeable attacks, leaving millions of …

Meta-path based attentional graph learning model for vulnerability detection

XC Wen, C Gao, J Ye, Y Li, Z Tian… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In recent years, deep learning (DL)-based methods have been widely used in code
vulnerability detection. The DL-based methods typically extract structural information from …

Feature-based learning for diverse and privacy-preserving counterfactual explanations

V Vo, T Le, V Nguyen, H Zhao, EV Bonilla… - Proceedings of the 29th …, 2023 - dl.acm.org
Interpretable machine learning seeks to understand the reasoning process of complex black-
box systems that are long notorious for lack of explainability. One flourishing approach is …