An approach for prediction of loan approval using machine learning algorithm

MA Sheikh, AK Goel, T Kumar - 2020 international conference …, 2020 - ieeexplore.ieee.org
In our banking system, banks have many products to sell but main source of income of any
banks is on its credit line. So they can earn from interest of those loans which they credits. A …

Pragmatic evidence of cross-language link detection: A systematic literature review

S Latif, Z Mushtaq, G Rasool, F Rustam, N Aslam… - Journal of Systems and …, 2023 - Elsevier
There is a rising trend for heterogeneous software applications involving multilingual source
code. The key focus of reverse engineers is to unravel the cross-language links (XLLs) and …

Don't leak your keys: Understanding, measuring, and exploiting the appsecret leaks in mini-programs

Y Zhang, Y Yang, Z Lin - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Mobile mini-programs in WeChat have gained significant popularity since their debut in
2017, reaching a scale similar to that of Android apps in the Play Store. Like Google …

Your code secret belongs to me: neural code completion tools can memorize hard-coded credentials

Y Huang, Y Li, W Wu, J Zhang, MR Lyu - Proceedings of the ACM on …, 2024 - dl.acm.org
Neural Code Completion Tools (NCCTs) have reshaped the field of software engineering,
which are built upon the language modeling technique and can accurately suggest …

Do not give away my secrets: Uncovering the privacy issue of neural code completion tools

Y Huang, Y Li, W Wu, J Zhang, MR Lyu - arXiv preprint arXiv:2309.07639, 2023 - arxiv.org
Neural Code Completion Tools (NCCTs) have reshaped the field of software development,
which accurately suggest contextually-relevant code snippets benefiting from language …

[HTML][HTML] Decoding developer password patterns: A comparative analysis of password extraction and selection practices

N Lykousas, C Patsakis - Computers & Security, 2024 - Elsevier
Passwords play a crucial role in authentication, ensuring that only authorised entities can
access sensitive information. However, user password choices are often weak and …

Measuring the leakage and exploitability of authentication secrets in super-apps: The wechat case

S Baskaran, L Zhao, M Mannan, A Youssef - Proceedings of the 26th …, 2023 - dl.acm.org
Super-apps such as WeChat and Baidu host millions of mini-apps, which are very popular
among users and developers because of the mini-apps' convenience, lightweight, ease of …

Open source solutions for vulnerability assessment: A comparative analysis

DB Cruz, JR Almeida, JL Oliveira - IEEE Access, 2023 - ieeexplore.ieee.org
As software applications continue to become more complex and attractive to cyber-attackers,
enhancing resilience against cyber threats becomes essential. Aiming to provide more …

Secretbench: A dataset of software secrets

SK Basak, L Neil, B Reaves… - 2023 IEEE/ACM 20th …, 2023 - ieeexplore.ieee.org
According to GitGuardian's monitoring of public GitHub repositories, the exposure of secrets
(API keys and other credentials) increased two-fold in 2021 compared to 2020, totaling more …

What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?

SK Basak, L Neil, B Reaves… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Throughout 2021, GitGuardian's monitoring of public GitHub repositories revealed a two-fold
increase in the number of secrets (database credentials, API keys, and other credentials) …