MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks
Memory-related vulnerabilities constitute severe threats to the security of modern software.
Despite the success of deep learning-based approaches to generic vulnerability detection …
Despite the success of deep learning-based approaches to generic vulnerability detection …
A new era in software security: Towards self-healing software via large language models and formal verification
This paper introduces an innovative approach that combines Large Language Models
(LLMs) with Formal Verification strategies for automatic software vulnerability repair. Initially …
(LLMs) with Formal Verification strategies for automatic software vulnerability repair. Initially …
Path-sensitive code embedding via contrastive learning for software vulnerability detection
Machine learning and its promising branch deep learning have shown success in a wide
range of application domains. Recently, much effort has been expended on applying deep …
range of application domains. Recently, much effort has been expended on applying deep …
SVF: interprocedural static value-flow analysis in LLVM
This paper presents SVF, a tool that enables scalable and precise interprocedural Static
Value-Flow analysis for C programs by leveraging recent advances in sparse analysis. SVF …
Value-Flow analysis for C programs by leveraging recent advances in sparse analysis. SVF …
Multi-modal attention network learning for semantic source code retrieval
Code retrieval techniques and tools have been playing a key role in facilitating software
developers to retrieve existing code fragments from available open-source repositories …
developers to retrieve existing code fragments from available open-source repositories …
Temporal system call specialization for attack surface reduction
Attack surface reduction through the removal of unnecessary application features and code
is a promising technique for improving security without incurring any additional overhead …
is a promising technique for improving security without incurring any additional overhead …
How about bug-triggering paths?-understanding and characterizing learning-based vulnerability detectors
Machine learning and its promising branch deep learning have proven to be effective in a
wide range of application domains. Recently, several efforts have shown success in …
wide range of application domains. Recently, several efforts have shown success in …
A survey of parametric static analysis
Understanding program behaviors is important to verify program properties or to optimize
programs. Static analysis is a widely used technique to approximate program behaviors via …
programs. Static analysis is a widely used technique to approximate program behaviors via …
Pinpoint: Fast and precise sparse value flow analysis for million lines of code
When dealing with millions of lines of code, we still cannot have the cake and eat it: sparse
value-flow analysis is powerful in checking source-sink problems, but existing work cannot …
value-flow analysis is powerful in checking source-sink problems, but existing work cannot …
Smoke: scalable path-sensitive memory leak detection for millions of lines of code
Detecting memory leak at industrial scale is still not well addressed, in spite of the
tremendous effort from both industry and academia in the past decades. Existing work …
tremendous effort from both industry and academia in the past decades. Existing work …