Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Zhengzi Xu"'
Publikováno v:
Cybersecurity, Vol 5, Iss 1, Pp 1-18 (2022)
Abstract Code similarity analysis has become more popular due to its significant applicantions, including vulnerability detection, malware detection, and patch analysis. Since the source code of the software is difficult to obtain under most circumst
Externí odkaz:
https://doaj.org/article/ad37b4465dbd4aab82fc5f4d521b494f
Autor:
SHOUGUO YANG, ZHENGZI XU, YANG XIAO, ZHE LANG, WEI TANG, YANG LIU, ZHIQIANG SHI, HONG LI, LIMIN SUN
Publikováno v:
ACM Transactions on Software Engineering & Methodology; Nov2023, Vol. 32 Issue 6, p1-29, 29p
Publikováno v:
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering.
To enhance the compatibility in the version control of Java Third-party Libraries (TPLs), Maven adopts Semantic Versioning (SemVer) to standardize the underlying meaning of versions, but users could still confront abnormal execution and crash after u
Publikováno v:
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering.
Third-party libraries (TPLs) are frequently reused in software to reduce development cost and the time to market. However, external library dependencies may introduce vulnerabilities into host applications. The issue of library dependency has receive
Publikováno v:
Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis.
Publikováno v:
Proceedings of the 44th International Conference on Software Engineering.
Publikováno v:
IEEE Transactions on Software Engineering. 45:1125-1149
Different from source code clone detection, clone detection (similar code search) in binary executables faces big challenges due to the gigantic differences in the syntax and the structure of binary code that result from different configurations of c
Autor:
Zhengzi Xu, Wei Huo, Chendong Yu, Yang Liu, Aihua Piao, Yang Xiao, Weiwei Zhang, Longquan Liu, Zimu Yuan, Wei Zou
Publikováno v:
SANER
Binary level code clone detection techniques have been used to identify 1-day vulnerabilities in software. It collects functions with known vulnerabilities and searches for similar functions in the target system. However, existing approaches are limi
Autor:
Zhengzi Xu
Publikováno v:
ASE
This paper presents a static vulnerability detection and patching framework at both source code and binary level. It automatically identifies and collects known vulnerability information to build the signature. It matches vulnerable functions with si