Deep learning based vulnerability detection: Are we there yet?

S Chakraborty, R Krishna, Y Ding… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …

A survey on developer-centred security

M Tahaei, K Vaniea - 2019 IEEE European Symposium on …, 2019 - ieeexplore.ieee.org
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …

Large language models for code: Security hardening and adversarial testing

J He, M Vechev - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Large language models (large LMs) are increasingly trained on massive codebases and
used to generate code. However, LMs lack awareness of security and are found to …

Security in the software development lifecycle

H Assal, S Chiasson - Fourteenth symposium on usable privacy and …, 2018 - usenix.org
We interviewed developers currently employed in industry to explore real-life software
security practices during each stage of the development lifecycle. This paper explores steps …

'Think secure from the beginning' A Survey with Software Developers

H Assal, S Chiasson - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Vulnerabilities persist despite existing software security initiatives and best practices. This
paper focuses on the human factors of software security, including human behaviour and …

Hackers vs. testers: A comparison of software vulnerability discovery processes

D Votipka, R Stevens, E Redmiles, J Hu… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Identifying security vulnerabilities in software is a critical task that requires significant human
effort. Currently, vulnerability discovery is often the responsibility of software testers before …

An empirical study of automated vulnerability localization with large language models

J Zhang, C Wang, A Li, W Sun, C Zhang, W Ma… - arxiv preprint arxiv …, 2024 - arxiv.org
Recently, Automated Vulnerability Localization (AVL) has attracted much attention, aiming to
facilitate diagnosis by pinpointing the lines of code responsible for discovered …

A large-scale study of usability criteria addressed by static analysis tools

M Nachtigall, M Schlichtig, E Bodden - Proceedings of the 31st ACM …, 2022 - dl.acm.org
Static analysis tools support developers in detecting potential coding issues, such as bugs
or vulnerabilities. Research on static analysis emphasizes its technical challenges but also …

VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

Y Ding, S Suneja, Y Zheng, J Laredo… - … on Software Analysis …, 2022 - ieeexplore.ieee.org
Automatically locating vulnerable statements in source code is crucial to assure software
security and alleviate developers' debugging efforts. This becomes even more important in …

Security misconfigurations in open source kubernetes manifests: An empirical study

A Rahman, SI Shamim, DB Bose… - ACM Transactions on …, 2023 - dl.acm.org
Context: Kubernetes has emerged as the de-facto tool for automated container
orchestration. Business and government organizations are increasingly adopting …