MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks
Memory-related vulnerabilities constitute severe threats to the security of modern software.
Despite the success of deep learning-based approaches to generic vulnerability detection …
Despite the success of deep learning-based approaches to generic vulnerability detection …
Aiops solutions for incident management: Technical guidelines and a comprehensive literature review
The management of modern IT systems poses unique challenges, necessitating scalability,
reliability, and efficiency in handling extensive data streams. Traditional methods, reliant on …
reliability, and efficiency in handling extensive data streams. Traditional methods, reliant on …
Smoke: scalable path-sensitive memory leak detection for millions of lines of code
Detecting memory leak at industrial scale is still not well addressed, in spite of the
tremendous effort from both industry and academia in the past decades. Existing work …
tremendous effort from both industry and academia in the past decades. Existing work …
Bogo: Buy spatial memory safety, get temporal memory safety (almost) free
A memory safety violation occurs when a program has an out-of-bound (spatial safety) or
use-after-free (temporal safety) memory access. Given its importance as a security …
use-after-free (temporal safety) memory access. Given its importance as a security …
Mutation-based fault localization for real-world multilingual programs (T)
S Hong, B Lee, T Kwak, Y Jeon, B Ko… - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Programmers maintain and evolve their software in a variety of programming languages to
take advantage of various control/data abstractions and legacy libraries. The programming …
take advantage of various control/data abstractions and legacy libraries. The programming …
Learning to detect memory-related vulnerabilities
Memory-related vulnerabilities can result in performance degradation or even program
crashes, constituting severe threats to the security of modern software. Despite the …
crashes, constituting severe threats to the security of modern software. Despite the …
Memory and resource leak defects and their repairs in Java projects
Despite huge software engineering efforts and programming language support, resource
and memory leaks are still a troublesome issue, even in memory-managed languages such …
and memory leaks are still a troublesome issue, even in memory-managed languages such …
Prorace: Practical data race detection for production use
This paper presents ProRace, a dynamic data race detector practical for production runs. It is
lightweight, but still offers high race detection capability. To track memory accesses …
lightweight, but still offers high race detection capability. To track memory accesses …
{RESIN}: A Holistic Service for Dealing with Memory Leaks in Production Cloud Infrastructure
Resin: A Holistic Service for Dealing with Memory Leaks in Production Cloud Infrastructure
Page 1 This paper is included in the Proceedings of the 16th USENIX Symposium on …
Page 1 This paper is included in the Proceedings of the 16th USENIX Symposium on …
Compiler-directed soft error detection and recovery to avoid DUE and SDC via Tail-DMR
This article presents Clover, a compiler-directed soft error detection and recovery scheme for
lightweight soft error resilience. The compiler carefully generates soft-error-tolerant code …
lightweight soft error resilience. The compiler carefully generates soft-error-tolerant code …