VulRepair: a T5-based automated software vulnerability repair
As software vulnerabilities grow in volume and complexity, researchers proposed various
Artificial Intelligence (AI)-based approaches to help under-resourced security analysts to …
Artificial Intelligence (AI)-based approaches to help under-resourced security analysts to …
Vulexplainer: A transformer-based hierarchical distillation for explaining vulnerability types
Deep learning-based vulnerability prediction approaches are proposed to help under-
resourced security practitioners to detect vulnerable functions. However, security …
resourced security practitioners to detect vulnerable functions. However, security …
How about bug-triggering paths?-understanding and characterizing learning-based vulnerability detectors
Machine learning and its promising branch deep learning have proven to be effective in a
wide range of application domains. Recently, several efforts have shown success in …
wide range of application domains. Recently, several efforts have shown success in …
Vision transformer inspired automated vulnerability repair
Recently, automated vulnerability repair approaches have been widely adopted to combat
increasing software security issues. In particular, transformer-based encoder-decoder …
increasing software security issues. In particular, transformer-based encoder-decoder …
AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities
Abstract Many Machine Learning (ML)-based approaches have been proposed to
automatically detect, localize, and repair software vulnerabilities. While ML-based methods …
automatically detect, localize, and repair software vulnerabilities. While ML-based methods …
Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding
The explosive growth of software vulnerabilities poses a serious threat to the system security
and has become one of the urgent problems of the day. However, existing vulnerability …
and has become one of the urgent problems of the day. However, existing vulnerability …
On the use of fine-grained vulnerable code statements for software vulnerability assessment models
Many studies have developed Machine Learning (ML) approaches to detect Software
Vulnerabilities (SVs) in functions and fine-grained code statements that cause such SVs …
Vulnerabilities (SVs) in functions and fine-grained code statements that cause such SVs …
An unbiased transformer source code learning with semantic vulnerability graph
Over the years, open-source software systems have become prey to threat actors. Even
highly-adopted software has been crippled by unforeseeable attacks, leaving millions of …
highly-adopted software has been crippled by unforeseeable attacks, leaving millions of …
Meta-path based attentional graph learning model for vulnerability detection
In recent years, deep learning (DL)-based methods have been widely used in code
vulnerability detection. The DL-based methods typically extract structural information from …
vulnerability detection. The DL-based methods typically extract structural information from …
Feature-based learning for diverse and privacy-preserving counterfactual explanations
Interpretable machine learning seeks to understand the reasoning process of complex black-
box systems that are long notorious for lack of explainability. One flourishing approach is …
box systems that are long notorious for lack of explainability. One flourishing approach is …