Interpreters for GNN-based vulnerability detection: Are we there yet?

Y Hu, S Wang, W Li, J Peng, Y Wu, D Zou… - Proceedings of the 32nd …, 2023 - dl.acm.org
Traditional vulnerability detection methods have limitations due to their need for extensive
manual labor. Using automated means for vulnerability detection has attracted research …

Vulnerabilities and Security Patches Detection in OSS: A Survey

R Lin, Y Fu, W Yi, J Yang, J Cao, Z Dong, F **e… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, Open Source Software (OSS) has experienced rapid growth and
widespread adoption, attributed to its openness and editability. However, this expansion has …

GraphSPD: Graph-based security patch detection with enriched code semantics

S Wang, X Wang, K Sun, S Jajodia… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …

Patchdb: A large-scale security patch dataset

X Wang, S Wang, P Feng, K Sun… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Security patches, embedding both vulnerable code and the corresponding fixes, are of great
significance to vulnerability detection and software maintenance. However, the existing …

Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding

Z Tian, B Tian, J Lv, Y Chen, L Chen - Expert Systems with Applications, 2024 - Elsevier
The explosive growth of software vulnerabilities poses a serious threat to the system security
and has become one of the urgent problems of the day. However, existing vulnerability …

Llm-powered code vulnerability repair with reinforcement learning and semantic reward

NT Islam, J Khoury, A Seong, MB Karkevandi… - arxiv preprint arxiv …, 2024 - arxiv.org
In software development, the predominant emphasis on functionality often supersedes
security concerns, a trend gaining momentum with AI-driven automation tools like GitHub …

ModX: binary level partially imported third-party library detection via program modularization and semantic matching

C Yang, Z Xu, H Chen, Y Liu, X Gong… - Proceedings of the 44th …, 2022 - dl.acm.org
With the rapid growth of software, using third-party libraries (TPLs) has become increasingly
popular. The prosperity of the library usage has provided the software engineers with a …

Locating the security patches for disclosed oss vulnerabilities with vulnerability-commit correlation ranking

X Tan, Y Zhang, C Mi, J Cao, K Sun, Y Lin… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security patches play an important role in defending against the security threats brought by
the increasing OSS vulnerabilities. However, the collection of security patches still remains a …

Survey of source code vulnerability analysis based on deep learning

C Liang, Q Wei, J Du, Y Wang, Z Jiang - Computers & Security, 2025 - Elsevier
Amidst the rapid development of the software industry and the burgeoning open-source
culture, vulnerability detection within the software security domain has emerged as an ever …

Tracer: Signature-based static analysis for detecting recurring vulnerabilities

W Kang, B Son, K Heo - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Similar software vulnerabilities recur because developers reuse existing vulnerable code, or
make similar mistakes when implementing the same logic. Recently, various analysis …