An empirical study on the effectiveness of static C code analyzers for vulnerability detection

S Lipp, S Banescu, A Pretschner - Proceedings of the 31st ACM …, 2022 - dl.acm.org
Static code analysis is often used to scan source code for security vulnerabilities. Given the
wide range of existing solutions implementing different analysis techniques, it is very …

Lava: Large-scale automated vulnerability addition

B Dolan-Gavitt, P Hulin, E Kirda, T Leek… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Work on automating vulnerability discovery has long been hampered by a shortage of
ground-truth corpora with which to evaluate tools and techniques. This lack of ground truth …

[HTML][HTML] A systematic literature review on benchmarks for evaluating debugging approaches

T Hirsch, B Hofer - Journal of Systems and Software, 2022 - Elsevier
Bug benchmarks are used in development and evaluation of debugging approaches, eg
fault localization and automated repair. Quantitative performance comparison of different …

[HTML][HTML] Software vulnerabilities in TensorFlow-based deep learning applications

K Filus, J Domańska - Computers & Security, 2023 - Elsevier
Abstract Usage of Deep Learning (DL) methods is ubiquitous. It is common in the
DL/Artificial Intelligence domain to use 3rd party software. TensorFlow is one of the most …

Exploring C semantics and pointer provenance

K Memarian, VBF Gomes, B Davis, S Kell… - Proceedings of the …, 2019 - dl.acm.org
The semantics of pointers and memory objects in C has been a vexed question for many
years. C values cannot be treated as either purely abstract or purely concrete entities: the …

A comparison of open-source static analysis tools for vulnerability detection in c/c++ code

A Arusoaie, S Ciobâca, V Craciun… - … on Symbolic and …, 2017 - ieeexplore.ieee.org
We describe work that is part of a research project on static code analysis between the
Alexandru Ioan Cuza University and Bitdefender. The goal of the project is to develop …

Towards security defect prediction with AI

CD Sestili, WS Snavely, NM VanHoudnos - arXiv preprint arXiv …, 2018 - arxiv.org
In this study, we investigate the limits of the current state of the art AI system for detecting
buffer overflows and compare it with current static analysis tools. To do so, we developed a …

On the use of open-source c/c++ static analysis tools in large projects

JDA Pereira, M Vieira - 2020 16th European Dependable …, 2020 - ieeexplore.ieee.org
Software applications are frequently deployed with security vulnerabilities that may open the
door to attacks. In business-critical scenarios, such attacks may lead to significant financial …

Evaluating and comparing memory error vulnerability detectors

Y Nong, H Cai, P Ye, L Li, F Chen - Information and Software Technology, 2021 - Elsevier
Context: Memory error vulnerabilities have been consequential and several well-known,
open-source memory error vulnerability detectors exist, built on static and/or dynamic code …

The Convergence of Source Code and Binary Vulnerability Discovery--A Case Study

A Mantovani, L Compagna, Y Shoshitaishvili… - Proceedings of the …, 2022 - dl.acm.org
Decompilers are tools designed to recover a high-level language representation (typically in
C code) from program binaries. Over the past five years, decompilers have improved …