Literature review on vulnerability detection using NLP technology

J Wu - arXiv preprint arXiv:2104.11230, 2021 - arxiv.org
Vulnerability detection has always been the most important task in the field of software
security. With the development of technology, in the face of massive source code, automated …

Symbiotic 9: String Analysis and Backward Symbolic Execution with Loop Folding: (Competition Contribution)

M Chalupa, V Mihalkovič, A Řechtáčková… - … Conference on Tools …, 2022 - Springer
The development of Symbiotic 9 focused mainly on two components. One is the symbolic
executor Slowbeast, which newly supports backward symbolic execution including its …

Symbiotic 10: Lazy Memory Initialization and Compact Symbolic Execution: (Competition Contribution)

M Jonáš, K Kumor, J Novák, J Sedláček, M Trtík… - … Conference on Tools …, 2024 - Springer
Symbiotic 10 brings four substantial improvements. First, we extended our clone of Klee
called JetKlee with lazy memory initialization. With this extension, JetKlee can symbolically …

Symbiotic 8: Beyond Symbolic Execution: (Competition Contribution)

M Chalupa, T Jašek, J Novák, A Řechtáčková… - … Conference on Tools …, 2021 - Springer
Symbiotic 8 extends the traditional combination of static analyses, instrumentation, program
slicing, and symbolic execution with one substantial novelty, namely a technique mixing …

ConfTainter: Static Taint Analysis For Configuration Options

T Wang, H He, X Liu, S Li, Z Jia, Y Jiang… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
The prevalence and severity of software configuration-induced issues have driven the
design and development of a number of detection and diagnosis techniques. Many of these …

Optimizing smart contract vulnerability detection via multi-modality code and entropy embedding

D Yuan, X Wang, Y Li, T Zhang - Journal of Systems and Software, 2023 - Elsevier
Smart contracts have been widely used in the blockchain world these years, and
simultaneously vulnerability detection has gained more and more attention due to the …

A Semantics-Based Approach on Binary Function Similarity Detection

Y Zhang, B Fang, Z Xiong, Y Wang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
As a fundamental component of Internet of Things (IoT) devices, firmware plays an essential
role. Nowadays, the development of IoT firmware relies extensively on third-party …

FuSeBMC v4: Improving code coverage with smart seeds via BMC, fuzzing and static analysis

K Alshmrany, M Aldughaim, A Bhayat… - Formal Aspects of …, 2024 - dl.acm.org
Bounded model checking (BMC) and fuzzing techniques are among the most effective
methods for detecting errors and security vulnerabilities in software. However, there are still …

Fast computation of strong control dependencies

M Chalupa, D Klas̆ka, J Strejček… - … Aided Verification: 33rd …, 2021 - Springer
We introduce new algorithms for computing non-termination sensitive control dependence
(NTSCD) and decisive order dependence (DOD). These relations on vertices of a control …

P-DATA: A Task-Level Parallel Framework for Dependency-Aware Value Flow Taint Analysis

R Xu, X Mao, L Chen - 2023 30th Asia-Pacific Software …, 2023 - ieeexplore.ieee.org
Taint analysis of value flows, as a static analysis technique, has gained widespread
application in the fields of software security and vulnerability mining. However, when dealing …