Harnessing large language models for software vulnerability detection: A comprehensive benchmarking study
K Tamberg, H Bahsi - IEEE Access, 2025 - ieeexplore.ieee.org
Despite various approaches being employed to detect software vulnerabilities, the number
of reported software vulnerabilities shows an upward trend over the years. This suggests the …
of reported software vulnerabilities shows an upward trend over the years. This suggests the …
State‐of‐the‐practice in quality assurance in Java‐based open source software development
To ensure the quality of software systems, software engineers can make use of a variety of
quality assurance approaches, for example, software testing, modern code review …
quality assurance approaches, for example, software testing, modern code review …
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature …
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …
automatic detection methods. Current techniques face challenges such as dependency …
Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java Code
Various static code analysis tools have been designed to automatically detect software faults
and security vulnerabilities. This paper aims to 1) conduct an empirical evaluation to assess …
and security vulnerabilities. This paper aims to 1) conduct an empirical evaluation to assess …
A memory-related vulnerability detection approach based on vulnerability model with petri net
J Chen, C Zhang, S Cai, L Zhang, L Ma - Journal of Logical and Algebraic …, 2023 - Elsevier
With the continuous development of information technology, software vulnerabilities have
become a critical threat to information security. Post-release detection of memory leaks …
become a critical threat to information security. Post-release detection of memory leaks …
[PDF][PDF] Shumaila Hussain, Muhammad Nadeem 3, Junaid Baber 2, 4, Mohammed Hamdi 5
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …
automatic detection methods. Current techniques face challenges such as dependency …
I3DE: An IDE for Inspecting Inconsistencies in PL/SQL Code
In this paper, we introduce I3DE (Inconsistency Inspecting IDE)---an IDE plugin to inspect
inconsistencies in PL/SQL code. We first observed the potential issues, eg, misuses or bugs …
inconsistencies in PL/SQL code. We first observed the potential issues, eg, misuses or bugs …
Design and Implement an Accurate Automated Static Analysis Checker to Detect Insecure Use of SecurityManager
Static analysis is a software testing technique that analyzes the code without executing it. It
is widely used to detect vulnerabilities, errors, and other issues during software …
is widely used to detect vulnerabilities, errors, and other issues during software …
Using page offsets for detecting control-flow anomalies
In this study, we introduce an approach that leverages memory-page offsets as an
abstraction mechanism for real-time detection of control-flow-affecting cyberattacks. We, in …
abstraction mechanism for real-time detection of control-flow-affecting cyberattacks. We, in …
Modelos de pruebas de seguridad estática en reducción de ineficiencia identificación de Inyección SQL en Aplicaciones Web
AT Garcia - Revista Científica y Tecnológica UPSE, 2024 - incyt.upse.edu.ec
La detección temprana de vulnerabilidades es crucial en el desarrollo de software para
garantizar la seguridad de las aplicaciones web, especialmente frente a ataques de …
garantizar la seguridad de las aplicaciones web, especialmente frente a ataques de …