Vuldeelocator: a deep learning-based fine-grained vulnerability detector

Z Li, D Zou, S Xu, Z Chen, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automatically detecting software vulnerabilities is an important problem that has attracted
much attention from the academic research community. However, existing vulnerability …

Modular information flow through ownership

W Crichton, M Patrignani, M Agrawala… - Proceedings of the 43rd …, 2022 - dl.acm.org
Statically analyzing information flow, or how data influences other data within a program, is a
challenging task in imperative languages. Analyzing pointers and mutations requires access …

Mudelta: Delta-oriented mutation testing at commit time

W Ma, TT Chekam, M Papadakis… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
To effectively test program changes using mutation testing, one needs to use mutants that
are relevant to the altered program behaviours. In view of this, we introduce MuDelta, an …

Understanding and dealing with hard faults in persistent memory systems

B Choi, R Burns, P Huang - … of the Sixteenth European Conference on …, 2021 - dl.acm.org
The advent of Persistent Memory (PM) devices enables systems to actively persist
information at low costs, including program state traditionally in volatile memory. However …

DG: Analysis and Slicing of LLVM Bitcode

M Chalupa - International Symposium on Automated Technology for …, 2020 - Springer
DG is a library written in C++ that provides several types of program analysis for LLVM
bitcode. The main parts of DG are a parametric points-to analysis, a call graph construction …

Applying slicing-based testability transformation to improve test data generation with symbolic execution

HY Chien, CY Huang, CC Fang - International Journal of …, 2021 - ijpe-online.com
Symbolic execution techniques are widely adopted in diverse fields, including software
quality analysis, software defect detection and so on. Symbolic execution engines assist …

[PDF][PDF] Vuldeelocator: A deep learning-based system for detecting and locating software vulnerabilities

Z Li, D Zou, S Xu, H Jin, Y Zhu, Y Zhang… - IEEE Transactions on …, 2021 - par.nsf.gov
Automatically detecting software vulnerabilities is an important problem that has attracted
much attention from the academic research community. However, existing vulnerability …

Cape: compiler-aided program transformation for htm-based cache side-channel defense

R Zhang, MD Bond, Y Zhang - Proceedings of the 31st ACM SIGPLAN …, 2022 - dl.acm.org
Cache side-channel attacks pose real threats to computer system security. Prior work called
Cloak leverages commodity hardware transactional memory (HTM) to protect sensitive data …

[HTML][HTML] DG: A program analysis library

M Chalupa - Software Impacts, 2020 - Elsevier
DG is a C++ library providing elements for building program analysis tools. Its main
components are a points-to analysis, a data dependence analysis, a control dependence …

[图书][B] Revisiting Program Slicing with Ownership-Based Information Flow

WP Crichton - 2022 - search.proquest.com
Program slicing is the technique of automatically identifying the subset of a program that is
relevant to a particular piece of code. In theory, slicing addresses one of the core challenges …