Deep learning based vulnerability detection: Are we there yet?

S Chakraborty, R Krishna, Y Ding… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …

[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?

F Lomio, E Iannone, A De Lucia, F Palomba… - Journal of Systems and …, 2022 - Elsevier
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …

Osiris: Hunting for integer bugs in ethereum smart contracts

CF Torres, J Schütte, R State - Proceedings of the 34th annual computer …, 2018 - dl.acm.org
The capability of executing so-called smart contracts in a decentralised manner is one of the
compelling features of modern blockchains. Smart contracts are fully fledged programs …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Modeling and discovering vulnerabilities with code property graphs

F Yamaguchi, N Golde, D Arp… - 2014 IEEE symposium on …, 2014 - ieeexplore.ieee.org
The vast majority of security breaches encountered today are a direct result of insecure
code. Consequently, the protection of computer systems critically depends on the rigorous …

Fuzzing: State of the art

H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of
weaknesses in a program, such as software bugs and vulnerabilities, by generating …

Appintent: Analyzing sensitive data transmission in android for privacy leakage detection

Z Yang, M Yang, Y Zhang, G Gu, P Ning… - Proceedings of the 2013 …, 2013 - dl.acm.org
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …

TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection

T Wang, T Wei, G Gu, W Zou - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
Fuzz testing has proven successful in finding security vulnerabilities in large programs.
However, traditional fuzz testing tools have a well-known common drawback: they are …

Verismart: A highly precise safety verifier for ethereum smart contracts

S So, M Lee, J Park, H Lee, H Oh - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present VERISMART, a highly precise verifier for ensuring arithmetic safety of Ethereum
smart contracts. Writing safe smart contracts without unintended behavior is critically …

Automatic inference of search patterns for taint-style vulnerabilities

F Yamaguchi, A Maier, H Gascon… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
Taint-style vulnerabilities are a persistent problem in software development, as the recently
discovered" Heart bleed" vulnerability strikingly illustrates. In this class of vulnerabilities …