Reinforcement learning for test case prioritization

M Bagherzadeh, N Kahani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Continuous Integration (CI) significantly reduces integration problems, speeds up
development time, and shortens release time. However, it also introduces new challenges …

A comparative study of vulnerability reporting by software composition analysis tools

N Imtiaz, S Thorn, L Williams - Proceedings of the 15th ACM/IEEE …, 2021 - dl.acm.org
Background: Modern software uses many third-party libraries and frameworks as
dependencies. Known vulnerabilities in these dependencies are a potential security risk …

Security weaknesses of copilot generated code in github

Y Fu, P Liang, A Tahir, Z Li, M Shahin, J Yu - arXiv preprint arXiv …, 2023 - arxiv.org
Modern code generation tools use AI models, particularly Large Language Models (LLMs),
to generate functional and complete code. While such tools are becoming popular and …

Improving java deserialization gadget chain mining via overriding-guided object generation

S Cao, X Sun, X Wu, L Bo, B Li, R Wu… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Java (de) serialization is prone to causing security-critical vulnerabilities that attackers can
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …

Autopruner: transformer-based call graph pruning

T Le-Cong, HJ Kang, TG Nguyen, SA Haryono… - Proceedings of the 30th …, 2022 - dl.acm.org
Constructing a static call graph requires trade-offs between soundness and precision.
Program analysis techniques for constructing call graphs are unfortunately usually …

Putting the semantics into semantic versioning

P Lam, J Dietrich, DJ Pearce - Proceedings of the 2020 ACM SIGPLAN …, 2020 - dl.acm.org
The long-standing aspiration for software reuse has made astonishing strides in the past few
years. Many modern software development ecosystems now come with rich sets of publicly …

Automatic specialization of third-party java dependencies

C Soto-Valero, D Tiwari, T Toady… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Large-scale code reuse significantly reduces both development costs and time. However,
the massive share of third-party code in software projects poses new challenges, especially …

A hybrid analysis to detect java serialisation vulnerabilities

S Rasheed, J Dietrich - Proceedings of the 35th IEEE/ACM International …, 2020 - dl.acm.org
Serialisation related security vulnerabilities have recently been reported for numerous Java
applications. Since serialisation presents both soundness and precision challenges for static …

PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code

W Jin, S Xu, D Chen, J He, D Zhong, M Fan… - Proceedings of the …, 2024 - dl.acm.org
Dependency extraction based on static analysis lays the groundwork for a wide range of
applications. However, dynamic language features in Python make code behaviors obscure …

Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications

D Jayasuriya, V Terragni, J Dietrich… - Proceedings of the ACM …, 2024 - dl.acm.org
Libraries play a significant role in software development as they provide reusable
functionality, which helps expedite the development process. As libraries evolve, they …