A new era in software security: Towards self-healing software via large language models and formal verification
This paper introduces an innovative approach that combines Large Language Models
(LLMs) with Formal Verification strategies for automatic software vulnerability repair. Initially …
(LLMs) with Formal Verification strategies for automatic software vulnerability repair. Initially …
OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering
Kernel concurrency bugs are notoriously difficult to identify, while their consequences
severely threaten the reliability and security of the entire system. Especially in the kernel …
severely threaten the reliability and security of the entire system. Especially in the kernel …
Diversity's Double-Edged Sword: Analyzing Race's Effect on Remote Pair Programming Interactions
Remote pair programming is widely used in software development, but no research has
examined how race affects these interactions between developers. We embarked on this …
examined how race affects these interactions between developers. We embarked on this …
NeuDep: neural binary memory dependence analysis
Determining whether multiple instructions can access the same memory location is a critical
task in binary analysis. It is challenging as statically computing precise alias information is …
task in binary analysis. It is challenging as statically computing precise alias information is …
Assessing Large Language Models in Comprehending and Verifying Concurrent Programs across Memory Models
As concurrent programming becomes increasingly prevalent, effectively identifying and
addressing concurrency issues such as data races and deadlocks is critical. This study …
addressing concurrency issues such as data races and deadlocks is critical. This study …
[BOOK][B] Analyzing and Securing Software via Robust and Generalizable Learning
K Pei - 2023 - search.proquest.com
Software permeates every facet of our lives, improving their convenience and efficiency, and
its sphere of influence continues to expand, leading to novel applications and services …
its sphere of influence continues to expand, leading to novel applications and services …