Y Zheng, S Pujar, B Lewis, L Buratti… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Static analysis tools are widely used for vulnerability detection as they understand programs with complex behavior and millions of lines of code. Despite their popularity, static analysis …
S Krüger, J Späth, K Ali, E Bodden… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Various studies have empirically shown that the majority of Java and Android applications misuse cryptographic libraries, causing devastating breaches of data security. It is crucial to …
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and vulnerable certificate verification, seriously threaten software security. The vision of …
We introduce the problem of learning distributed representations of edits. By combining a" neural editor" with an" edit encoder", our models learn to represent the salient information of …
As privacy-sensitive applications based on zero-knowledge proofs (ZKPs) gain increasing traction, there is a pressing need to detect vulnerabilities in ZKP circuits. This paper studies …
L Di Grazia, M Pradel - Proceedings of the 30th ACM Joint European …, 2022 - dl.acm.org
Type annotations and gradual type checkers attempt to reveal errors and facilitate maintenance in dynamically typed programming languages. Despite the availability of these …
The increasing trend of using Large Language Models (LLMs) for code generation raises the question of their capability to generate trustworthy code. While many researchers are …
Android app developers recurrently use crypto-APIs to provide data security to app users. Unfortunately, misuse of APIs only creates an illusion of security and even exposes apps to …
M Wen, Y Liu, R Wu, X Xie… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Misuses of library APIs are pervasive and often lead to software crashes and vulnerability issues. Various static analysis tools have been proposed to detect library API misuses. They …