Toward Improved Deep Learning-based Vulnerability Detection

A Sejfia, S Das, S Shafiq, N Medvidović - Proceedings of the 46th IEEE …, 2024 - dl.acm.org
Deep learning (DL) has been a common thread across several recent techniques for
vulnerability detection. The rise of large, publicly available datasets of vulnerabilities has …

Revealing code change propagation channels by evolution history mining

D Zhou, Y Wu, X Peng, J Zhang, Z Li - Journal of Systems and Software, 2024 - Elsevier
Abstract Changes on source code may propagate to distant code entities through various
kinds of relationships, which may form up change propagation channels. It is however …

[PDF][PDF] Data Flow and Control Flow Analysis of Problematic Commits

W Muylaert - 2024 - soft.vub.ac.be
When creating and maintaining programs, software developers make use of version control
software to store different versions of the source code. Version control software uses …