An in-depth survey of bypassing buffer overflow mitigation techniques

MA Butt, Z Ajmal, ZI Khan, M Idrees, Y Javed - Applied Sciences, 2022 - mdpi.com
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three
decades, potentially compromising any software application or system. This vulnerability …

How do developers follow security-relevant best practices when using NPM packages?

MMA Kabir, Y Wang, D Yao… - 2022 IEEE Secure …, 2022 - ieeexplore.ieee.org
Node. js has become popular among developers, partially because of its large software
ecosystem of NPM (Node Package Manager) packages. When building JavaScript (JS) …

Measurement of Embedding Choices on Cryptographic API Completion Tasks

Y **ao, W Song, S Ahmed, X Ge, B Viswanath… - ACM Transactions on …, 2024 - dl.acm.org
In this article, we conduct a measurement study to comprehensively compare the accuracy
impacts of multiple embedding options in cryptographic API completion tasks. Embedding is …

Methodology Development for Improving the Performance of Critical Classification Applications

S Afrose - 2023 - vtechworks.lib.vt.edu
People interact with different critical applications in day-to-day life. Some examples of critical
applications include computer programs, anonymous vehicles, digital healthcare, smart …