LineVD: statement-level vulnerability detection using graph neural networks

D Hin, A Kan, H Chen, MA Babar - Proceedings of the 19th international …, 2022 - dl.acm.org
Current machine-learning based software vulnerability detection methods are primarily
conducted at the function-level. However, a key limitation of these methods is that they do …

Securify: Practical security analysis of smart contracts

P Tsankov, A Dan, D Drachsler-Cohen… - Proceedings of the …, 2018 - dl.acm.org
Permissionless blockchains allow the execution of arbitrary programs (called smart
contracts), enabling mutually untrusted entities to interact without relying on trusted third …

Mining node. js vulnerabilities via object dependence graph and query

S Li, M Kang, J Hou, Y Cao - 31st USENIX Security Symposium …, 2022 - usenix.org
Node. js is a popular non-browser JavaScript platform that provides useful but sometimes
also vulnerable packages. On one hand, prior works have proposed many program analysis …

P/taint: Unified points-to and taint analysis

N Grech, Y Smaragdakis - Proceedings of the ACM on Programming …, 2017 - dl.acm.org
Static information-flow analysis (especially taint-analysis) is a key technique in software
security, computing where sensitive or untrusted data can propagate in a program. Points-to …

Data provenance to audit compliance with privacy policy in the Internet of Things

T Pasquier, J Singh, J Powles, D Eyers… - Personal and Ubiquitous …, 2018 - Springer
Managing privacy in the IoT presents a significant challenge. We make the case that
information obtained by auditing the flows of data can assist in demonstrating that the …

Efficient and flexible discovery of php application vulnerabilities

M Backes, K Rieck, M Skoruppa, B Stock… - 2017 IEEE european …, 2017 - ieeexplore.ieee.org
The Web today is a growing universe of pages and applications teeming with interactive
content. The security of such applications is of the utmost importance, as exploits can have a …

Smelly variables in ansible infrastructure code: Detection, prevalence, and lifetime

R Opdebeeck, A Zerouali, C De Roover - Proceedings of the 19th …, 2022 - dl.acm.org
Infrastructure as Code is the practice of automating the provisioning, configuration, and
orchestration of network nodes using code in which variable values such as configuration …

Vuldetector: Detecting vulnerabilities using weighted feature graph comparison

L Cui, Z Hao, Y Jiao, H Fei, X Yun - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Code similarity is one promising approach to detect vulnerabilities hidden in software
programs. However, due to the complexity and diversity of source code, current methods …

Inferring crypto API rules from code changes

R Paletov, P Tsankov, V Raychev, M Vechev - ACM SIGPLAN Notices, 2018 - dl.acm.org
Creating and maintaining an up-to-date set of security rules that match misuses of crypto
APIs is challenging, as crypto APIs constantly evolve over time with new cryptographic …

LWeb: Information flow security for multi-tier web applications

J Parker, N Vazou, M Hicks - Proceedings of the ACM on Programming …, 2019 - dl.acm.org
This paper presents LWeb, a framework for enforcing label-based, information flow policies
in database-using web applications. In a nutshell, LWeb marries the LIO Haskell IFC …