Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
Enhancing vulnerability detection efficiency: An exploration of light-weight LLMs with hybrid code features
Journal of Information Security and Applications (JISA), Volume 88, Issue Chttps://doi.org/10.1016/j.jisa.2024.103925AbstractVulnerability detection is a critical research topic. However, the performance of existing neural network-based approaches requires further improvement. The emergence of large language models (LLMs) has demonstrated their superior performance in ...
- research-articleDecember 2024JUST ACCEPTED
Beyond Cohesion and Coupling: Integrating Control Flow in Software Modularization Process for Better Code Comprehensibility
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3707452As software systems evolve to meet the changing needs of users, understanding the source code becomes a critical step in the process. Clustering techniques, also known as modularization techniques, offer a solution to breaking down complex source code ...
- surveyNovember 2024
A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning
- Nima Shiri Harzevili,
- Alvine Boaye Belle,
- Junjie Wang,
- Song Wang,
- Zhen Ming (Jack) Jiang,
- Nachiappan Nagappan
ACM Computing Surveys (CSUR), Volume 57, Issue 3Article No.: 55, Pages 1–36https://doi.org/10.1145/3699711In recent years, numerous Machine Learning (ML) models, including Deep Learning (DL) and classic ML models, have been developed to detect software vulnerabilities. However, there is a notable lack of comprehensive and systematic surveys that summarize, ...
- ArticleJanuary 2025
Enhancing Vulnerability Detection with Domain Knowledge: A Comparison of Different Mechanisms
AbstractExisting software vulnerability detection methods based on deep-learning and large language models are effective in the identification of vulnerable source code snippets. Their effectiveness, however, decreases when applied to localize the ...
- ArticleJanuary 2025
Towards a Knowledge Graph Based Approach for Vulnerable Code Weaknesses Identification
AbstractA large literature exists that investigates the use of learning models for vulnerabilities detection. Even if it is well-recognized that the presence of code weaknesses (CWEs) in code fragments can make them vulnerable, most of the effort has been ...
-
- research-articleOctober 2024
Decoding developer password patterns: A comparative analysis of password extraction and selection practices
AbstractPasswords play a crucial role in authentication, ensuring that only authorised entities can access sensitive information. However, user password choices are often weak and predictable, making them susceptible to cyber-attacks. Additionally, hard-...
- rapid-communicationSeptember 2024
Understanding 3D seismic data visualization with C++, OpenGL and GLSL
AbstractSeismic data visualization in 3D space is a valuable interpretation tool. Several open-source visualization tools are available. However, little explanation is provided about the inner working of visualization process. The current work discusses ...
Highlights- Low-level structure of seismic visualization explained in detail with code.
- Texture and shader notions are discussed in application to 3D seismic visualization.
- “Hello world” equivalent source code for 3D seismic data ...
- research-articleJune 2024
MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension
AbstractRecently, automatic vulnerability detection approaches based on machine learning (ML) have outperformed traditional rule-based approaches in terms of detection performance. Existing ML-based approaches typically concentrate on function or line ...
- research-articleMay 2024
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications
International Journal of Information Security (IJOIS), Volume 23, Issue 4Pages 2677–2690https://doi.org/10.1007/s10207-024-00848-6AbstractThe proliferation of the Internet of Things (IoT) paradigm has ushered in a new era of connectivity and convenience. Consequently, rapid IoT expansion has introduced unprecedented security challenges , among which source code vulnerabilities ...
- research-articleMarch 2024
Software vulnerable functions discovery based on code composite feature
Journal of Information Security and Applications (JISA), Volume 81, Issue Chttps://doi.org/10.1016/j.jisa.2024.103718AbstractVulnerability identification is crucial to protecting software systems from attacks. Although numerous learning-based solutions have been suggested to assist in vulnerability identification, these approaches often face challenges due to the ...
- research-articleDecember 2023
Leveraging a combination of machine learning and formal concept analysis to locate the implementation of features in software variants
Information and Software Technology (INST), Volume 164, Issue Chttps://doi.org/10.1016/j.infsof.2023.107320Abstract Context:Recently, software variants are adopted to build software product lines in the industry. In this adoption, the available assets (features, source code, design documents, etc.) are reused to build a software product line rather than ...
- research-articleNovember 2023
DeKeDVer: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code
Information and Software Technology (INST), Volume 163, Issue Chttps://doi.org/10.1016/j.infsof.2023.107290Abstract Context:Software vulnerabilities have confused software developers for a long time. Vulnerability classification is thus crucial, through which we can know the specific type of vulnerability and then conduct targeted ...
- research-articleSeptember 2023
A novel vulnerability severity assessment method for source code based on a graph neural network
Information and Software Technology (INST), Volume 161, Issue Chttps://doi.org/10.1016/j.infsof.2023.107247Abstract ContextVulnerability severity assessment is an important part of vulnerability management that can help security personnel determine the priority of vulnerability repair work.
ObjectiveAiming ...
- research-articleJuly 2023
The lifecycle of Technical Debt that manifests in both source code and issue trackers
Information and Software Technology (INST), Volume 159, Issue Chttps://doi.org/10.1016/j.infsof.2023.107216Abstract Context:Although Technical Debt (TD) has increasingly gained attention in recent years, most studies exploring TD are based on a single source (e.g., source code, code comments or issue trackers).
... - research-articleMay 2023
A comparative study of adversarial training methods for neural models of source code
Future Generation Computer Systems (FGCS), Volume 142, Issue CPages 165–181https://doi.org/10.1016/j.future.2022.12.030AbstractAdversarial training has been employed by researchers to protect AI models of source code. However, it is still unknown how adversarial training methods in this field compare to each other in effectiveness and robustness. This study ...
Highlights- Defining four dimensions to classify adversarial training methods in code domain
- ArticleNovember 2022
Specifying Source Code and Signal-based Behaviour of Cyber-Physical System Components
AbstractSpecifying properties over the behaviour of components of Cyber-Physical Systems usually focuses on the behaviour of signals, i.e., the behaviour of the physical part of the system, leaving the behaviour of the cyber components implicit. There ...
- research-articleAugust 2022
Generating class name in sequential manner using convolution attention neural network
Expert Systems with Applications: An International Journal (EXWA), Volume 199, Issue Chttps://doi.org/10.1016/j.eswa.2022.116854AbstractSoftware code comprehension is strongly dependent on identifier names; therefore, software developers spend a lot of time assigning suitable names to identifiers. Manually suggesting a good name is a time taking and hard problem for ...
Highlights- We have proposed a novel approach for class name prediction in tokenized manner.
- research-articleJune 2022
Algorithms Off-limits?: If digital trade law restricts access to source code of software then accountability will suffer
FAccT '22: Proceedings of the 2022 ACM Conference on Fairness, Accountability, and TransparencyPages 1561–1570https://doi.org/10.1145/3531146.3533212Free trade agreements are increasingly used to construct an additional layer of protection for source code of software. This comes in the shape of a new prohibition for governments to require access to, or transfer of, source code of software, subject to ...
- research-articleJanuary 2022
Relationships between software architecture and source code in practice: An exploratory survey and interview
Information and Software Technology (INST), Volume 141, Issue Chttps://doi.org/10.1016/j.infsof.2021.106705Abstract ContextSoftware Architecture (SA) and Source Code (SC) are two intertwined artefacts that represent the interdependent design decisions made at different levels of abstractions - High-Level (HL) and Low-Level (LL). An ...
- research-articleDecember 2021
Feature-based insight for forks in social coding platforms
Information and Software Technology (INST), Volume 140, Issue Chttps://doi.org/10.1016/j.infsof.2021.106679Abstract Context:Recently, fork-based development has shown to be an easy and straightforward technique to reuse the source code of existing projects (upstream projects and their forks) in open source communities (for example, ...