Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions
Value-flow analysis is a fundamental technique in program analysis, benefiting various
clients, such as memory corruption detection and taint analysis. However, existing efforts …
clients, such as memory corruption detection and taint analysis. However, existing efforts …
Finewave: fine-grained warning verification of bugs for automated static analysis tools
Automated Static Analysis Tools (ASATs) have evolved over time to assist in detecting bugs.
However, the excessive false warnings can impede developers' productivity and confidence …
However, the excessive false warnings can impede developers' productivity and confidence …
Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements
Software composition analysis (SCA) denotes the process of identifying open-source
software components in an input software application. SCA has been extensively developed …
software components in an input software application. SCA has been extensively developed …
P-DATA: A Task-Level Parallel Framework for Dependency-Aware Value Flow Taint Analysis
R Xu, X Mao, L Chen - 2023 30th Asia-Pacific Software …, 2023 - ieeexplore.ieee.org
Taint analysis of value flows, as a static analysis technique, has gained widespread
application in the fields of software security and vulnerability mining. However, when dealing …
application in the fields of software security and vulnerability mining. However, when dealing …
Boosting Path-Sensitive Value Flow Analysis via Removal of Redundant Summaries
Value flow analysis that tracks the flow of values via data dependence is a widely used
technique for detecting a broad spectrum of software bugs. However, the scalability issue …
technique for detecting a broad spectrum of software bugs. However, the scalability issue …
Accelerating High-Precision Vulnerability Detection in C Programs with Parallel Graph Summarization
R Xu, X Mao, W **ao - 2023 6th International Conference on …, 2023 - ieeexplore.ieee.org
C language programs are often subject to memory vulnerabilities, posing substantial
security risks to software systems. Conventional detection techniques, rooted in static value …
security risks to software systems. Conventional detection techniques, rooted in static value …
Accelerating Static Null Pointer Dereference Detection with Parallel Computing
R Xu, L Chen, R Zhang, Y Zhang, W **ao… - Proceedings of the 15th …, 2024 - dl.acm.org
High-precision static analysis can effectively detect Null Pointer Dereference (NPD)
vulnerabilities in C language, but the performance overhead is significant. In recent years …
vulnerabilities in C language, but the performance overhead is significant. In recent years …
Robustifying Large-Scale Cloud Applications With Scalable Value-Flow Analysis
W Tang - 2024 - search.proquest.com
In the realm of cloud-native applications, ensuring robustness amidst the complexities of
distributed architectures presents a substantial challenge. The dynamic and interconnected …
distributed architectures presents a substantial challenge. The dynamic and interconnected …
Exploring Scalability of Value-Flow Graph Construction
R Xu, H Peng, K Yang, X Mao - Proceedings of the 2024 4th International …, 2024 - dl.acm.org
In modern software systems, the construction of Value-Flow Graphs (VFGs) is a critical step
for performing static analysis and vulnerability detection. However, traditional VFG …
for performing static analysis and vulnerability detection. However, traditional VFG …
[PDF][PDF] Enhancing Reliability and Performance of Data-centric Systems with Static Analysis
C Wang - 2023 - chengpeng-wang.github.io
In recent years, data-centric systems have gained significant popularity, particularly in
industrial production settings. These systems serve as the backbone of modern computing …
industrial production settings. These systems serve as the backbone of modern computing …