MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks

S Cao, X Sun, L Bo, R Wu, B Li, C Tao - Proceedings of the 44th …, 2022 - dl.acm.org
Memory-related vulnerabilities constitute severe threats to the security of modern software.
Despite the success of deep learning-based approaches to generic vulnerability detection …

A new era in software security: Towards self-healing software via large language models and formal verification

N Tihanyi, R Jain, Y Charalambous, MA Ferrag… - arxiv preprint arxiv …, 2023 - arxiv.org
This paper introduces an innovative approach that combines Large Language Models
(LLMs) with Formal Verification strategies for automatic software vulnerability repair. Initially …

Path-sensitive code embedding via contrastive learning for software vulnerability detection

X Cheng, G Zhang, H Wang, Y Sui - Proceedings of the 31st ACM …, 2022 - dl.acm.org
Machine learning and its promising branch deep learning have shown success in a wide
range of application domains. Recently, much effort has been expended on applying deep …

SVF: interprocedural static value-flow analysis in LLVM

Y Sui, J Xue - Proceedings of the 25th international conference on …, 2016 - dl.acm.org
This paper presents SVF, a tool that enables scalable and precise interprocedural Static
Value-Flow analysis for C programs by leveraging recent advances in sparse analysis. SVF …

Multi-modal attention network learning for semantic source code retrieval

Y Wan, J Shu, Y Sui, G Xu, Z Zhao… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Code retrieval techniques and tools have been playing a key role in facilitating software
developers to retrieve existing code fragments from available open-source repositories …

Temporal system call specialization for attack surface reduction

S Ghavamnia, T Palit, S Mishra… - 29th USENIX Security …, 2020 - usenix.org
Attack surface reduction through the removal of unnecessary application features and code
is a promising technique for improving security without incurring any additional overhead …

How about bug-triggering paths?-understanding and characterizing learning-based vulnerability detectors

X Cheng, X Nie, N Li, H Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning and its promising branch deep learning have proven to be effective in a
wide range of application domains. Recently, several efforts have shown success in …

A survey of parametric static analysis

J Park, H Lee, S Ryu - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Understanding program behaviors is important to verify program properties or to optimize
programs. Static analysis is a widely used technique to approximate program behaviors via …

Pinpoint: Fast and precise sparse value flow analysis for million lines of code

Q Shi, X **ao, R Wu, J Zhou, G Fan… - Proceedings of the 39th …, 2018 - dl.acm.org
When dealing with millions of lines of code, we still cannot have the cake and eat it: sparse
value-flow analysis is powerful in checking source-sink problems, but existing work cannot …

Smoke: scalable path-sensitive memory leak detection for millions of lines of code

G Fan, R Wu, Q Shi, X **ao, J Zhou… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Detecting memory leak at industrial scale is still not well addressed, in spite of the
tremendous effort from both industry and academia in the past decades. Existing work …