LineVD: statement-level vulnerability detection using graph neural networks
Current machine-learning based software vulnerability detection methods are primarily
conducted at the function-level. However, a key limitation of these methods is that they do …
conducted at the function-level. However, a key limitation of these methods is that they do …
Securify: Practical security analysis of smart contracts
Permissionless blockchains allow the execution of arbitrary programs (called smart
contracts), enabling mutually untrusted entities to interact without relying on trusted third …
contracts), enabling mutually untrusted entities to interact without relying on trusted third …
Mining node. js vulnerabilities via object dependence graph and query
Node. js is a popular non-browser JavaScript platform that provides useful but sometimes
also vulnerable packages. On one hand, prior works have proposed many program analysis …
also vulnerable packages. On one hand, prior works have proposed many program analysis …
P/taint: Unified points-to and taint analysis
Static information-flow analysis (especially taint-analysis) is a key technique in software
security, computing where sensitive or untrusted data can propagate in a program. Points-to …
security, computing where sensitive or untrusted data can propagate in a program. Points-to …
Data provenance to audit compliance with privacy policy in the Internet of Things
Managing privacy in the IoT presents a significant challenge. We make the case that
information obtained by auditing the flows of data can assist in demonstrating that the …
information obtained by auditing the flows of data can assist in demonstrating that the …
Efficient and flexible discovery of php application vulnerabilities
The Web today is a growing universe of pages and applications teeming with interactive
content. The security of such applications is of the utmost importance, as exploits can have a …
content. The security of such applications is of the utmost importance, as exploits can have a …
Smelly variables in ansible infrastructure code: Detection, prevalence, and lifetime
Infrastructure as Code is the practice of automating the provisioning, configuration, and
orchestration of network nodes using code in which variable values such as configuration …
orchestration of network nodes using code in which variable values such as configuration …
Vuldetector: Detecting vulnerabilities using weighted feature graph comparison
Code similarity is one promising approach to detect vulnerabilities hidden in software
programs. However, due to the complexity and diversity of source code, current methods …
programs. However, due to the complexity and diversity of source code, current methods …
Inferring crypto API rules from code changes
Creating and maintaining an up-to-date set of security rules that match misuses of crypto
APIs is challenging, as crypto APIs constantly evolve over time with new cryptographic …
APIs is challenging, as crypto APIs constantly evolve over time with new cryptographic …
LWeb: Information flow security for multi-tier web applications
This paper presents LWeb, a framework for enforcing label-based, information flow policies
in database-using web applications. In a nutshell, LWeb marries the LIO Haskell IFC …
in database-using web applications. In a nutshell, LWeb marries the LIO Haskell IFC …