Harnessing large language models for software vulnerability detection: A comprehensive benchmarking study

K Tamberg, H Bahsi - IEEE Access, 2025 - ieeexplore.ieee.org
Despite various approaches being employed to detect software vulnerabilities, the number
of reported software vulnerabilities shows an upward trend over the years. This suggests the …

State‐of‐the‐practice in quality assurance in Java‐based open source software development

A Khatami, A Zaidman - Software: Practice and Experience, 2024 - Wiley Online Library
To ensure the quality of software systems, software engineers can make use of a variety of
quality assurance approaches, for example, software testing, modern code review …

Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature …

S Hussain, M Nadeem, J Baber, M Hamdi, A Rajab… - Scientific Reports, 2024 - nature.com
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …

Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java Code

M Alqaradaghi, T Kozsik - IEEE Access, 2024 - ieeexplore.ieee.org
Various static code analysis tools have been designed to automatically detect software faults
and security vulnerabilities. This paper aims to 1) conduct an empirical evaluation to assess …

A memory-related vulnerability detection approach based on vulnerability model with petri net

J Chen, C Zhang, S Cai, L Zhang, L Ma - Journal of Logical and Algebraic …, 2023 - Elsevier
With the continuous development of information technology, software vulnerabilities have
become a critical threat to information security. Post-release detection of memory leaks …

[PDF][PDF] Shumaila Hussain, Muhammad Nadeem 3, Junaid Baber 2, 4, Mohammed Hamdi 5

A Rajab, MS Al Reshan, A Shaikh - Scientific Reports, 2024 - researchgate.net
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …

I3DE: An IDE for Inspecting Inconsistencies in PL/SQL Code

J Liu, S Liu, J Chen - Proceedings of the 1st ACM/IEEE Workshop on …, 2024 - dl.acm.org
In this paper, we introduce I3DE (Inconsistency Inspecting IDE)---an IDE plugin to inspect
inconsistencies in PL/SQL code. We first observed the potential issues, eg, misuses or bugs …

Design and Implement an Accurate Automated Static Analysis Checker to Detect Insecure Use of SecurityManager

M Alqaradaghi, MZI Nazir, T Kozsik - Computers, 2023 - mdpi.com
Static analysis is a software testing technique that analyzes the code without executing it. It
is widely used to detect vulnerabilities, errors, and other issues during software …

Using page offsets for detecting control-flow anomalies

E Varan, K Hanifi, AR Erdemli, M Unal, YE Tat… - International Conference …, 2023 - Springer
In this study, we introduce an approach that leverages memory-page offsets as an
abstraction mechanism for real-time detection of control-flow-affecting cyberattacks. We, in …

Modelos de pruebas de seguridad estática en reducción de ineficiencia identificación de Inyección SQL en Aplicaciones Web

AT Garcia - Revista Científica y Tecnológica UPSE, 2024 - incyt.upse.edu.ec
La detección temprana de vulnerabilidades es crucial en el desarrollo de software para
garantizar la seguridad de las aplicaciones web, especialmente frente a ataques de …