A comparative study of vulnerability reporting by software composition analysis tools

N Imtiaz, S Thorn, L Williams - Proceedings of the 15th ACM/IEEE …, 2021 - dl.acm.org
Background: Modern software uses many third-party libraries and frameworks as
dependencies. Known vulnerabilities in these dependencies are a potential security risk …

Security weaknesses of copilot generated code in github

Y Fu, P Liang, A Tahir, Z Li, M Shahin, J Yu… - arxiv preprint arxiv …, 2023 - arxiv.org
Modern code generation tools, utilizing AI models like Large Language Models (LLMs),
have gained popularity for producing functional code. However, their usage presents …

Reinforcement learning for test case prioritization

M Bagherzadeh, N Kahani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Continuous Integration (CI) significantly reduces integration problems, speeds up
development time, and shortens release time. However, it also introduces new challenges …

Improving java deserialization gadget chain mining via overriding-guided object generation

S Cao, X Sun, X Wu, L Bo, B Li, R Wu… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Java (de) serialization is prone to causing security-critical vulnerabilities that attackers can
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …

Autopruner: transformer-based call graph pruning

T Le-Cong, HJ Kang, TG Nguyen, SA Haryono… - Proceedings of the 30th …, 2022 - dl.acm.org
Constructing a static call graph requires trade-offs between soundness and precision.
Program analysis techniques for constructing call graphs are unfortunately usually …

Understanding the impact of APIs behavioral breaking changes on client applications

D Jayasuriya, V Terragni, J Dietrich… - Proceedings of the ACM …, 2024 - dl.acm.org
Libraries play a significant role in software development as they provide reusable
functionality, which helps expedite the development process. As libraries evolve, they …

That'sa tough call: Studying the challenges of call graph construction for WebAssembly

D Lehmann, M Thalakottur, F Tip, M Pradel - Proceedings of the 32nd …, 2023 - dl.acm.org
WebAssembly is a low-level bytecode format that powers applications and libraries running
in browsers, on the server side, and in standalone runtimes. Call graphs are at the core of …

Putting the semantics into semantic versioning

P Lam, J Dietrich, DJ Pearce - Proceedings of the 2020 ACM SIGPLAN …, 2020 - dl.acm.org
The long-standing aspiration for software reuse has made astonishing strides in the past few
years. Many modern software development ecosystems now come with rich sets of publicly …

DyPyBench: A benchmark of executable python software

I Bouzenia, BP Krishan, M Pradel - Proceedings of the ACM on Software …, 2024 - dl.acm.org
Python has emerged as one of the most popular programming languages, extensively
utilized in domains such as machine learning, data analysis, and web applications. Python's …

Frankenstein: fast and lightweight call graph generation for software builds

M Keshani, G Gousios, S Proksch - Empirical Software Engineering, 2024 - Springer
Call Graphs are a rich data source and form the foundation for advanced static analyses that
can, for example, detect security vulnerabilities or dead code. This information is invaluable …