Getafix: Learning to fix bugs automatically

J Bader, A Scott, M Pradel, S Chandra - Proceedings of the ACM on …, 2019 - dl.acm.org
Static analyzers help find bugs early by warning about recurring bug categories. While fixing
these bugs still remains a mostly manual task in practice, we observe that fixes for a specific …

A large-scale empirical study of security patches

F Li, V Paxson - Proceedings of the 2017 ACM SIGSAC Conference on …, 2017 - dl.acm.org
Given how the" patching treadmill" plays a central role for enabling sites to counter emergent
security concerns, it behooves the security community to understand the patch development …

Arja: Automated repair of java programs via multi-objective genetic programming

Y Yuan, W Banzhaf - IEEE Transactions on software …, 2018 - ieeexplore.ieee.org
Automated program repair is the problem of automatically fixing bugs in programs in order to
significantly reduce the debugging costs and improve the software quality. To address this …

Dissection of a bug dataset: Anatomy of 395 patches from defects4j

V Sobreira, T Durieux, F Madeiral… - 2018 IEEE 25th …, 2018 - ieeexplore.ieee.org
Well-designed and publicly available datasets of bugs are an invaluable asset to advance
research fields such as fault localization and program repair as they allow directly and fairly …

Spain: security patch analysis for binaries towards understanding the pain and pills

Z Xu, B Chen, M Chandramohan… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
Software vulnerability is one of the major threats to software security. Once discovered,
vulnerabilities are often fixed by applying security patches. In that sense, security patches …

Decoding the representation of code in the brain: An fMRI study of code review and expertise

B Floyd, T Santander, W Weimer - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
Subjective judgments in software engineering tasks are of critical importance but can be
difficult to study with conventional means. Medical imaging techniques hold the promise of …

Understanding the reproducibility of crowd-reported security vulnerabilities

D Mu, A Cuevas, L Yang, H Hu, X **ng, B Mao… - 27th USENIX Security …, 2018 - usenix.org
Today's software systems are increasingly relying on the “power of the crowd” to identify new
security vulnerabilities. And yet, it is not well understood how reproducible the crowd …

GraphSPD: Graph-based security patch detection with enriched code semantics

S Wang, X Wang, K Sun, S Jajodia… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …

Patchdb: A large-scale security patch dataset

X Wang, S Wang, P Feng, K Sun… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Security patches, embedding both vulnerable code and the corresponding fixes, are of great
significance to vulnerability detection and software maintenance. However, the existing …

[PDF][PDF] How bad can it git? characterizing secret leakage in public github repositories.

M Meli, MR McNiece, B Reaves - NDSS, 2019 - bradreaves.net
GitHub and similar platforms have made public collaborative development of software
commonplace. However, a problem arises when this public code must manage …