When software security meets large language models: A survey

X Zhu, W Zhou, QL Han, W Ma, S Wen… - IEEE/CAA Journal of …, 2025 - ieeexplore.ieee.org
Software security poses substantial risks to our society because software has become part of
our life. Numerous techniques have been proposed to resolve or mitigate the impact of …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Transformer-based vulnerability detection in code at EditTime: Zero-shot, few-shot, or fine-tuning?

A Chan, A Kharkar, RZ Moghaddam… - arxiv preprint arxiv …, 2023 - arxiv.org
Software vulnerabilities bear enterprises significant costs. Despite extensive efforts in
research and development of software vulnerability detection methods, uncaught …

Sjfuzz: Seed and mutator scheduling for jvm fuzzing

M Wu, Y Ouyang, M Lu, J Chen, Y Zhao, H Cui… - Proceedings of the 31st …, 2023 - dl.acm.org
While the Java Virtual Machine (JVM) plays a vital role in ensuring correct executions of
Java applications, testing JVMs via generating and running class files on them can be rather …

{µFUZZ}: Redesign of Parallel Fuzzing using Microservice Architecture

Y Chen, R Zhong, Y Yang, H Hu, D Wu… - 32nd USENIX Security …, 2023 - usenix.org
Fuzzing has been widely adopted as an effective testing technique for detecting software
bugs. Researchers have explored many parallel fuzzing approaches to speed up bug …

A novel memory usage guided fuzzing based on particle swarm optimization

S Wang, J Chen, J Zhang, S Cai, W Zhang… - Swarm and Evolutionary …, 2024 - Elsevier
Fuzzing has become the focus of research in the field of software testing due to its
advantages such as simple testing process, easy deployment, and easy reproduction of …

A Usability Evaluation of AFL and libFuzzer with CS Students

S Plöger, M Meier, M Smith - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
In top-tier companies and academia, fuzzing has established itself as a valuable tool for
finding bugs. It is a tool created by experts for experts, and a lot of research is being invested …

Profile-guided system optimizations for accelerated greybox fuzzing

Y Zhang, C Pang, S Nagy, X Chen, J Xu - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Greybox fuzzing is a highly popular option for security testing, incentivizing tremendous
efforts to improve its performance. Prior research has brought many algorithmic …

RAI4IoE: Responsible AI for enabling the Internet of Energy

M Xue, S Nepal, L Liu… - 2023 5th IEEE …, 2023 - ieeexplore.ieee.org
This paper plans to develop an Equitable and Re-sponsible AI framework with enabling
techniques and algorithms for the Internet of Energy (IoE), in short, RAI4IoE. The energy …

SHAPFUZZ: Efficient Fuzzing via Shapley-Guided Byte Selection

K Zhang, X Zhu, X **ao, M Xue, C Zhang… - arxiv preprint arxiv …, 2023 - arxiv.org
Mutation-based fuzzing is popular and effective in discovering unseen code and exposing
bugs. However, only a few studies have concentrated on quantifying the importance of input …