[HTML][HTML] A systematic literature review on benchmarks for evaluating debugging approaches

T Hirsch, B Hofer - Journal of Systems and Software, 2022 - Elsevier
Bug benchmarks are used in development and evaluation of debugging approaches, eg
fault localization and automated repair. Quantitative performance comparison of different …

" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

Llmseceval: A dataset of natural language prompts for security evaluations

C Tony, M Mutas, NED Ferreyra… - 2023 IEEE/ACM 20th …, 2023 - ieeexplore.ieee.org
Large Language Models (LLMs) like Codex are powerful tools for performing code
completion and code generation tasks as they are trained on billions of lines of code from …

Prompting techniques for secure code generation: A systematic investigation

C Tony, NED Ferreyra, M Mutas, S Dhiff… - arXiv preprint arXiv …, 2024 - arxiv.org
Large Language Models (LLMs) are gaining momentum in software development with
prompt-driven programming enabling developers to create code from natural language (NL) …

CamBench--Cryptographic API Misuse Detection Tool Benchmark Suite

M Schlichtig, AK Wickert, S Krüger, E Bodden… - arXiv preprint arXiv …, 2022 - arxiv.org
Context: Cryptographic APIs are often misused in real-world applications. Therefore, many
cryptographic API misuse detection tools have been introduced. However, there exists no …

Github considered harmful? analyzing open-source projects for the automatic generation of cryptographic api call sequences

C Tony, NED Ferreyra… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
GitHub is a popular data repository for code examples. It is being continuously used to train
several AI-based tools to automatically generate code. However, the effectiveness of such …

Analyzing cryptographic api usages for android applications using hmm and n-gram

Z Xu, X Hu, Y Tao, S Qin - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
A recent research shows that 88% of Android applications that use cryptographic APIs make
at least one mistake. For this reason, several tools have been proposed to detect crypto API …

Building a Framework to Improve the User Experience of Static Analysis Tools

M Schlichtig - Proceedings of the 2024 IEEE/ACM 46th International …, 2024 - dl.acm.org
Static analysis tools are an important technique that helps in the development of secure
code by analyzing code and reporting potential errors to developers. Besides the technical …

Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software

H Fan, F Zheng, J Lin, L Meng, M Wang… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Cryptographic algorithms are fundamental to secure software development, but security
vulnerabilities can arise during implementation, usage, and when calling third-party …

Blockchain Implementation Challenges for IoT

T Banerjee - Blockchain, 2022 - taylorfrancis.com
Blockchain technology is currently spreading across varied areas of modern information and
communication technology, especially related to computing, informatics, and …