Large language models for software engineering: Survey and open problems

A Fan, B Gokkaya, M Harman… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
This paper provides a survey of the emerging area of Large Language Models (LLMs) for
Software Engineering (SE). It also sets out open research challenges for the application of …

Smart greybox fuzzing

VT Pham, M Böhme, AE Santosa… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Coverage-based greybox fuzzing (CGF) is one of the most successful approaches for
automated vulnerability detection. Given a seed file (as a sequence of bits), a CGF randomly …

Are we there yet? unraveling the state-of-the-art smart contract fuzzers

S Wu, Z Li, L Yan, W Chen, M Jiang, C Wang… - Proceedings of the …, 2024 - dl.acm.org
Given the growing importance of smart contracts in various applications, ensuring their
security and reliability is critical. Fuzzing, an effective vulnerability detection technique, has …

Observation-based unit test generation at meta

N Alshahwan, M Harman, A Marginean, R Tal… - … Proceedings of the …, 2024 - dl.acm.org
TestGen automatically generates unit tests, carved from serialized observations of complex
objects, observed during app execution. We describe the development and deployment of …

Software testing research challenges: An industrial perspective

N Alshahwan, M Harman… - 2023 IEEE Conference …, 2023 - ieeexplore.ieee.org
There have been rapid recent developments in automated software test design, repair and
program improvement. Advances in artificial intelligence also have great potential impact to …

AGLFuzz: Automata-Guided Fuzzing for detecting logic errors in security protocol implementations

D Zhao, J Guo, C Gu, Y Zheng, X Zhang - Computers & Security, 2025 - Elsevier
Security protocols are crucial for ensuring communication security and safeguarding data
integrity in computer networks and distributed systems. The complexity of security protocol …

An analysis of how many undiscovered vulnerabilities remain in information systems

JM Spring - Computers & Security, 2023 - Elsevier
Vulnerability management strategy, from both organizational and public policy perspectives,
hinges on an understanding of the supply of undiscovered vulnerabilities. If the number of …

A Code Knowledge Graph-Enhanced System for LLM-Based Fuzz Driver Generation

H Xu, W Ma, T Zhou, Y Zhao, K Chen, Q Hu… - arXiv preprint arXiv …, 2024 - arxiv.org
The rapid development of large language models (LLMs) with advanced programming
capabilities has paved the way for innovative approaches in software testing. Fuzz testing, a …

BertRLFuzzer: A BERT and reinforcement learning based fuzzer

P Jha, J Scott, JS Ganeshna, M Singh… - arXiv preprint arXiv …, 2023 - arxiv.org
We present a novel tool BertRLFuzzer, a BERT and Reinforcement Learning (RL) based
fuzzer aimed at finding security vulnerabilities for Web applications. BertRLFuzzer works as …

FlinkCheck: property-based testing for apache flink

CV Espinosa, E Martin-Martin, A Riesco… - IEEE …, 2019 - ieeexplore.ieee.org
Apache Flink is an open-source, soft real-time stream processing framework underlying
many modern systems dealing with cloud and real-time computing, data analytics, and the …