Reinforcement learning for test case prioritization

M Bagherzadeh, N Kahani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Continuous Integration (CI) significantly reduces integration problems, speeds up
development time, and shortens release time. However, it also introduces new challenges …

A comparative study of vulnerability reporting by software composition analysis tools

N Imtiaz, S Thorn, L Williams - Proceedings of the 15th ACM/IEEE …, 2021 - dl.acm.org
Background: Modern software uses many third-party libraries and frameworks as
dependencies. Known vulnerabilities in these dependencies are a potential security risk …

Improving java deserialization gadget chain mining via overriding-guided object generation

S Cao, X Sun, X Wu, L Bo, B Li, R Wu… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Java (de) serialization is prone to causing security-critical vulnerabilities that attackers can
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …

Autopruner: transformer-based call graph pruning

T Le-Cong, HJ Kang, TG Nguyen, SA Haryono… - Proceedings of the 30th …, 2022 - dl.acm.org
Constructing a static call graph requires trade-offs between soundness and precision.
Program analysis techniques for constructing call graphs are unfortunately usually …

Putting the semantics into semantic versioning

P Lam, J Dietrich, DJ Pearce - Proceedings of the 2020 ACM SIGPLAN …, 2020 - dl.acm.org
The long-standing aspiration for software reuse has made astonishing strides in the past few
years. Many modern software development ecosystems now come with rich sets of publicly …

That'sa Tough Call: Studying the Challenges of Call Graph Construction for WebAssembly

D Lehmann, M Thalakottur, F Tip, M Pradel - Proceedings of the 32nd …, 2023 - dl.acm.org
WebAssembly is a low-level bytecode format that powers applications and libraries running
in browsers, on the server side, and in standalone runtimes. Call graphs are at the core of …

Security Weaknesses of Copilot Generated Code in GitHub

Y Fu, P Liang, A Tahir, Z Li, M Shahin, J Yu - arXiv preprint arXiv …, 2023 - arxiv.org
Modern code generation tools use AI models, particularly Large Language Models (LLMs),
to generate functional and complete code. While such tools are becoming popular and …

A hybrid analysis to detect java serialisation vulnerabilities

S Rasheed, J Dietrich - Proceedings of the 35th IEEE/ACM International …, 2020 - dl.acm.org
Serialisation related security vulnerabilities have recently been reported for numerous Java
applications. Since serialisation presents both soundness and precision challenges for static …

PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code

W Jin, S Xu, D Chen, J He, D Zhong, M Fan… - Proceedings of the …, 2024 - dl.acm.org
Dependency extraction based on static analysis lays the groundwork for a wide range of
applications. However, dynamic language features in Python make code behaviors obscure …

Automatic specialization of third-party java dependencies

C Soto-Valero, D Tiwari, T Toady… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Large-scale code reuse significantly reduces both development costs and time. However,
the massive share of third-party code in software projects poses new challenges, especially …