[HTML][HTML] Enhanced automated code vulnerability repair using large language models

D de-Fitero-Dominguez, E Garcia-Lopez… - … Applications of Artificial …, 2024 - Elsevier
This research addresses the complex challenge of automated repair of code vulnerabilities,
vital for enhancing digital security in an increasingly technology-driven world. The study …

[HTML][HTML] The anatomy of a vulnerability database: A systematic map** study

X Li, S Moreschini, Z Zhang, F Palomba… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities play a major role, as there are multiple risks associated, including
loss and manipulation of private data. The software engineering research community has …

A compact vulnerability knowledge graph for risk assessment

J Yin, W Hong, H Wang, J Cao, Y Miao… - ACM Transactions on …, 2024 - dl.acm.org
Software vulnerabilities, also known as flaws, bugs or weaknesses, are common in modern
information systems, putting critical data of organizations and individuals at cyber risk. Due …

Code-centric learning-based just-in-time vulnerability detection

S Nguyen, TT Nguyen, TT Vu, TD Do, KT Ngo… - Journal of Systems and …, 2024 - Elsevier
Attacks against computer systems exploiting software vulnerabilities can cause substantial
damage to the cyber infrastructure of our modern society and economy. To minimize the …

Automatic software vulnerability assessment by extracting vulnerability elements

X Sun, Z Ye, L Bo, X Wu, Y Wei, T Zhang, B Li - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities take threats to software security. When faced with multiple software
vulnerabilities, the most urgent ones need to be fixed first. Therefore, it is critical to assess …

A catalog of metrics at source code level for vulnerability prediction: A systematic map** study

Z Codabux, K Zakia Sultana… - Journal of Software …, 2024 - Wiley Online Library
Industry practitioners assess software from a security perspective to reduce the risks of
deploying vulnerable software. Besides following security best practice guidelines during …

Just-in-Time crash prediction for mobile apps

C Wimalasooriya, SA Licorish, DA da Costa… - Empirical Software …, 2024 - Springer
Abstract Just-In-Time (JIT) defect prediction aims to identify defects early, at commit time.
Hence, developers can take precautions to avoid defects when the code changes are still …