MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks

S Cao, X Sun, L Bo, R Wu, B Li, C Tao - Proceedings of the 44th …, 2022 - dl.acm.org
Memory-related vulnerabilities constitute severe threats to the security of modern software.
Despite the success of deep learning-based approaches to generic vulnerability detection …

Aiops solutions for incident management: Technical guidelines and a comprehensive literature review

Y Remil, A Bendimerad, R Mathonat… - arxiv preprint arxiv …, 2024 - arxiv.org
The management of modern IT systems poses unique challenges, necessitating scalability,
reliability, and efficiency in handling extensive data streams. Traditional methods, reliant on …

Smoke: scalable path-sensitive memory leak detection for millions of lines of code

G Fan, R Wu, Q Shi, X **ao, J Zhou… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Detecting memory leak at industrial scale is still not well addressed, in spite of the
tremendous effort from both industry and academia in the past decades. Existing work …

Bogo: Buy spatial memory safety, get temporal memory safety (almost) free

T Zhang, D Lee, C Jung - Proceedings of the Twenty-Fourth International …, 2019 - dl.acm.org
A memory safety violation occurs when a program has an out-of-bound (spatial safety) or
use-after-free (temporal safety) memory access. Given its importance as a security …

Mutation-based fault localization for real-world multilingual programs (T)

S Hong, B Lee, T Kwak, Y Jeon, B Ko… - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Programmers maintain and evolve their software in a variety of programming languages to
take advantage of various control/data abstractions and legacy libraries. The programming …

Learning to detect memory-related vulnerabilities

S Cao, X Sun, L Bo, R Wu, B Li, X Wu, C Tao… - ACM Transactions on …, 2023 - dl.acm.org
Memory-related vulnerabilities can result in performance degradation or even program
crashes, constituting severe threats to the security of modern software. Despite the …

Memory and resource leak defects and their repairs in Java projects

M Ghanavati, D Costa, J Seboek, D Lo… - Empirical Software …, 2020 - Springer
Despite huge software engineering efforts and programming language support, resource
and memory leaks are still a troublesome issue, even in memory-managed languages such …

Prorace: Practical data race detection for production use

T Zhang, C Jung, D Lee - ACM SIGPLAN Notices, 2017 - dl.acm.org
This paper presents ProRace, a dynamic data race detector practical for production runs. It is
lightweight, but still offers high race detection capability. To track memory accesses …

{RESIN}: A Holistic Service for Dealing with Memory Leaks in Production Cloud Infrastructure

C Lou, C Chen, P Huang, Y Dang, S Qin… - … USENIX Symposium on …, 2022 - usenix.org
Resin: A Holistic Service for Dealing with Memory Leaks in Production Cloud Infrastructure
Page 1 This paper is included in the Proceedings of the 16th USENIX Symposium on …

Compiler-directed soft error detection and recovery to avoid DUE and SDC via Tail-DMR

Q Liu, C Jung, D Lee, D Tiwari - ACM Transactions on Embedded …, 2016 - dl.acm.org
This article presents Clover, a compiler-directed soft error detection and recovery scheme for
lightweight soft error resilience. The compiler carefully generates soft-error-tolerant code …