Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
An investigation into misuse of java security apis by large language models
The increasing trend of using Large Language Models (LLMs) for code generation raises
the question of their capability to generate trustworthy code. While many researchers are …
the question of their capability to generate trustworthy code. While many researchers are …
Llm security guard for code
A Kavian, MM Pourhashem Kallehbasti… - Proceedings of the 28th …, 2024 - dl.acm.org
Many developers rely on Large Language Models (LLMs) to facilitate software development.
Nevertheless, these models have exhibited limited capabilities in the security domain. We …
Nevertheless, these models have exhibited limited capabilities in the security domain. We …
[HTML][HTML] Time to separate from StackOverflow and match with ChatGPT for encryption
Cryptography is known as a challenging topic for developers. We studied StackOverflow
posts to identify the problems that developers encounter when using Java Cryptography …
posts to identify the problems that developers encounter when using Java Cryptography …
Prompting techniques for secure code generation: A systematic investigation
Large Language Models (LLMs) are gaining momentum in software development with
prompt-driven programming enabling developers to create code from natural language (NL) …
prompt-driven programming enabling developers to create code from natural language (NL) …
“Do this! Do that!, And nothing will happen” Do specifications lead to securely stored passwords?
Does the act of writing a specification (how the code should behave) for a piece of security
sensitive code lead to developers producing more secure code? We asked 138 developers …
sensitive code lead to developers producing more secure code? We asked 138 developers …
Detecting Misuse of Security APIs: A Systematic Review
Security Application Programming Interfaces (APIs) are crucial for ensuring software
security. However, their misuse introduces vulnerabilities, potentially leading to severe data …
security. However, their misuse introduces vulnerabilities, potentially leading to severe data …
Java cryptography uses in the wild
[Background] Previous research has shown that developers commonly misuse cryptography
APIs.[Aim] We have conducted an exploratory study to find out how crypto APIs are used in …
APIs.[Aim] We have conducted an exploratory study to find out how crypto APIs are used in …
ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools
The correct adoption of cryptography APIs is challenging for mainstream developers, often
resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have …
resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have …
Fluentcrypto: Cryptography in easy mode
S Kafader, M Ghafari - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
Research has shown that cryptography concepts are hard to understand for developers, and
secure use of cryptography APIs is challenging for mainstream developers. We have …
secure use of cryptography APIs is challenging for mainstream developers. We have …