An empirical study on the effectiveness of static C code analyzers for vulnerability detection

S Lipp, S Banescu, A Pretschner - Proceedings of the 31st ACM …, 2022 - dl.acm.org
Static code analysis is often used to scan source code for security vulnerabilities. Given the
wide range of existing solutions implementing different analysis techniques, it is very …

An empirical study of rule-based and learning-based approaches for static application security testing

R Croft, D Newlands, Z Chen, MA Babar - Proceedings of the 15th ACM …, 2021 - dl.acm.org
Background: Static Application Security Testing (SAST) tools purport to assist developers in
detecting security issues in source code. These tools typically use rule-based approaches to …

Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java

K Li, S Chen, L Fan, R Feng, H Liu, C Liu… - Proceedings of the 31st …, 2023 - dl.acm.org
Static application security testing (SAST) takes a significant role in the software development
life cycle (SDLC). However, it is challenging to comprehensively evaluate the effectiveness …

[PDF][PDF] Myths and facts about static application security testing tools: an action research at Telenor digital

TD Oyetoyan, B Milosheska, M Grini… - Agile Processes in …, 2018 - library.oapen.org
It is claimed that integrating agile and security in practice is challenging. There is the notion
that security is a heavy process, requires expertise, and consumes developers' time. These …

[HTML][HTML] APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities

QC Bui, R Paramitha, DL Vu, F Massacci… - Empirical software …, 2024 - Springer
Security vulnerability fixes could be a promising research avenue for Automated Program
Repair (APR) techniques. In recent years, APR tools have been thoroughly developed for …

Automated generation of test cases for smart contract security analyzers

KB Kim, J Lee - IEEE Access, 2020 - ieeexplore.ieee.org
We address the absence of reliable tests on contract analyzers of smart contracts and
present a systematic method to diversify test cases by combining smart-contract-specific …

Crashtalk: Automated generation of precise, human readable, descriptions of software security bugs

K James, K Valakuzhy, K Snow… - Proceedings of the …, 2024 - dl.acm.org
Understanding the cause, consequences, and severity of a security bug are critical facets of
the overall bug triaging and remediation process. Unfortunately, diagnosing failures is often …

A memory-related vulnerability detection approach based on vulnerability features

J Hu, J Chen, L Zhang, Y Liu, Q Bao… - Tsinghua Science …, 2020 - ieeexplore.ieee.org
Developing secure software systems is a major challenge in the software industry due to
errors or weaknesses that bring vulnerabilities to the software system. To address this …

AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation

A Küchler, L Wenning, F Wendland - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
In the past years, the CWE-190 integer overflow led to many vulnerabilities. Program
verification techniques such as Abstract Interpretation can show that no such bug is present …

Toward register spilling security using LLVM and ARM pointer authentication

A Fanti, CC Perez, R Denis-Courmont… - … on Computer-Aided …, 2022 - ieeexplore.ieee.org
Modern reduced instruction set computer processors are based on a load/store architecture,
where all computations are performed on register operands. Compilers therefore allocate …