Developer's roadmap to design software vulnerability detection model using different ai approaches

S Pooja, CB Chandrakala, LK Raju - IEEE Access, 2022 - ieeexplore.ieee.org
Automatic software vulnerability detection has caught the eyes of researchers as because
software vulnerabilities are exploited vehemently causing major cyber-attacks. Thus …

[PDF][PDF] May-Happen-in-Parallel Analysis for Slicing of Parallel Programs

J Sedláček - 2024 - is.muni.cz
This thesis presents an overview of may-happen-in-parallel analysis in the context of static
program slicing. We explain the concepts of static program slicing and may-happen-in …

Slicing Assisted Program Verification: An Empirical Study

W Chai, R Yan, W Zhang, J Zhang - International Symposium on …, 2024 - Springer
Simplifying programs before verification aims to reduce program complexity thus saving the
verification effort. In the paper, we investigate the impacts of applying program slicing before …

[PDF][PDF] Evaluating Reliability of Static Analysis Results Using Machine Learning

BT BERÁNEK - itspy.cz
Abstract The Meta Infer static analyzer is a tool for detecting various types of errors in source
code. However, its results contain more than 95% of false alarms. This thesis proposes a …

[PDF][PDF] Tbrno FACULTY

M Chalupa, T Jašek, L Tomovič, M Hruška, V Šoková… - theses.cz
This thesis explores the integration of two prominent software analysis tools, Predator and
Symbiotic, which are utilised for detecting memory-safety errors in C programs. The research …

[PDF][PDF] INTEGRATION OF THE PREDATOR AND SYMBIOTIC SOFTWARE ANALYSERS

BO KINŠT - theses.cz
This thesis explores the integration of two prominent software analysis tools, Predator and
Symbiotic, which are utilised for detecting memory-safety errors in C programs. The research …

[引用][C] Taintpoint: Fuzzing taint flow efficiently with live trace

方浩然, 郭帆, 李航宇 - Journal of Software, 2022

[引用][C] TaintPoint: 使用活跃轨迹高效挖掘污点风格漏洞

方浩然, 郭帆, 李航宇 - 软件学报, 2022