[HTML][HTML] Formal methods and validation techniques for ensuring automotive systems security

M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …

An empirical study of static analysis tools for secure code review

W Charoenwet, P Thongtanunam, VT Pham… - Proceedings of the 33rd …, 2024 - dl.acm.org
Early identification of security issues in software development is vital to minimize their
unanticipated impacts. Code review is a widely used manual analysis method that aims to …

A survey on modern code review: Progresses, challenges and opportunities

Z Yang, C Gao, Z Guo, Z Li, K Liu, X **a… - arxiv preprint arxiv …, 2024 - arxiv.org
Over the past decade, modern code review (MCR) has been deemed as a crucial practice of
software quality assurance, which is applied to improve software quality and transfer …

Can ChatGPT emulate humans in software engineering surveys?

I Steinmacher, JM Penney, KR Felizardo… - Proceedings of the 18th …, 2024 - dl.acm.org
Context: There is a growing belief in the literature that large language models (LLMs), such
as ChatGPT, can mimic human behavior in surveys. Gap: While the literature has shown …

Empirical analysis of security-related code reviews in npm packages

M Alfadel, NA Nagy, DE Costa, R Abdalkareem… - Journal of Systems and …, 2023 - Elsevier
Security issues are a major concern in software packages and their impact can be
detrimental if exploited. Modern code review is a widely-used practice that project …

Managing vulnerabilities in software projects: the case of NTT data

S Nocera, S Romano, R Francese… - 2023 49th Euromicro …, 2023 - ieeexplore.ieee.org
Background: Software vulnerabilities are flaws in application source code that can be
exploited to cause harm, hence companies must devise strategies to manage them. Aim: We …

Large-scale agile security practices in software engineering

C Ascenção, H Teixeira, J Gonçalves… - Information & Computer …, 2024 - emerald.com
Purpose Security in large-scale agile is a crucial aspect that should be carefully addressed
to ensure the protection of sensitive data, systems and user privacy. This study aims to …

Vulnerability Detection in Popular Programming Languages with Language Models

SA Atiiq, C Gehrmann, K Dahlén - arxiv preprint arxiv:2412.15905, 2024 - arxiv.org
Vulnerability detection is crucial for maintaining software security, and recent research has
explored the use of Language Models (LMs) for this task. While LMs have shown promising …

Identifying personal data processing for code review

F Tang, BM Østvold, M Bruntink - arxiv preprint arxiv:2301.01568, 2023 - arxiv.org
Code review is a critical step in the software development life cycle, which assesses and
boosts the code's effectiveness and correctness, pinpoints security issues, and raises its …

Toward effective secure code reviews: an empirical study of security-related coding weaknesses

W Charoenwet, P Thongtanunam, VT Pham… - Empirical Software …, 2024 - Springer
Identifying security issues early is encouraged to reduce the latent negative impacts on the
software systems. Code review is a widely-used method that allows developers to manually …