Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comparative study of vulnerability reporting by software composition analysis tools
Background: Modern software uses many third-party libraries and frameworks as
dependencies. Known vulnerabilities in these dependencies are a potential security risk …
dependencies. Known vulnerabilities in these dependencies are a potential security risk …
Security weaknesses of copilot generated code in github
Modern code generation tools, utilizing AI models like Large Language Models (LLMs),
have gained popularity for producing functional code. However, their usage presents …
have gained popularity for producing functional code. However, their usage presents …
Reinforcement learning for test case prioritization
Continuous Integration (CI) significantly reduces integration problems, speeds up
development time, and shortens release time. However, it also introduces new challenges …
development time, and shortens release time. However, it also introduces new challenges …
Improving java deserialization gadget chain mining via overriding-guided object generation
Java (de) serialization is prone to causing security-critical vulnerabilities that attackers can
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …
Autopruner: transformer-based call graph pruning
Constructing a static call graph requires trade-offs between soundness and precision.
Program analysis techniques for constructing call graphs are unfortunately usually …
Program analysis techniques for constructing call graphs are unfortunately usually …
Understanding the impact of APIs behavioral breaking changes on client applications
Libraries play a significant role in software development as they provide reusable
functionality, which helps expedite the development process. As libraries evolve, they …
functionality, which helps expedite the development process. As libraries evolve, they …
That'sa tough call: Studying the challenges of call graph construction for WebAssembly
WebAssembly is a low-level bytecode format that powers applications and libraries running
in browsers, on the server side, and in standalone runtimes. Call graphs are at the core of …
in browsers, on the server side, and in standalone runtimes. Call graphs are at the core of …
Putting the semantics into semantic versioning
The long-standing aspiration for software reuse has made astonishing strides in the past few
years. Many modern software development ecosystems now come with rich sets of publicly …
years. Many modern software development ecosystems now come with rich sets of publicly …
DyPyBench: A benchmark of executable python software
Python has emerged as one of the most popular programming languages, extensively
utilized in domains such as machine learning, data analysis, and web applications. Python's …
utilized in domains such as machine learning, data analysis, and web applications. Python's …
Frankenstein: fast and lightweight call graph generation for software builds
Call Graphs are a rich data source and form the foundation for advanced static analyses that
can, for example, detect security vulnerabilities or dead code. This information is invaluable …
can, for example, detect security vulnerabilities or dead code. This information is invaluable …