Search Results - "Security and privacy Software and applications security Software security engineering"
-
1
ReGuard: finding reentrancy bugs in smart contracts
ISBN: 145035663X, 9781450356633ISSN: 2574-1934Published: New York, NY, USA ACM 27.05.2018Published in 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion) (27.05.2018)“…Smart contracts enabled a new way to perform cryptocurrency transactions over blockchains. While this emerging technique introduces free-of-conflicts and…”
Get full text
Conference Proceeding -
2
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis
ISSN: 1558-1225Published: ACM 14.04.2024Published in Proceedings / International Conference on Software Engineering (14.04.2024)“…Smart contracts are prone to various vulnerabilities, leading to substantial financial losses over time. Current analysis tools mainly target vulnerabilities…”
Get full text
Conference Proceeding -
3
MEMLOCK: Memory Usage Guided Fuzzing
ISSN: 1558-1225Published: ACM 01.10.2020Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01.10.2020)“…Uncontrolled memory consumption is a kind of critical software security weaknesses. It can also become a security-critical vulnerability when attackers can…”
Get full text
Conference Proceeding -
4
MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Memory-related vulnerabilities constitute severe threats to the security of modern software. Despite the success of deep learning-based approaches to generic…”
Get full text
Conference Proceeding -
5
Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities
ISSN: 1558-1225Published: ACM 01.10.2020Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01.10.2020)“…Existing coverage-based fuzzers usually use the individual control flow graph (CFG) edge coverage to guide the fuzzing process, which has shown great potential…”
Get full text
Conference Proceeding -
6
SmartBugs: A Framework to Analyze Solidity Smart Contracts
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…Over the last few years, there has been substantial research on automated analysis, testing, and debugging of Ethereum smart contracts. However, it is not…”
Get full text
Conference Proceeding -
7
SCVHUNTER: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network
ISSN: 1558-1225Published: ACM 14.04.2024Published in Proceedings / International Conference on Software Engineering (14.04.2024)“…Smart contracts are integral to blockchain's growth, but their vulnerabilities pose a significant threat. Traditional vulnerability detection methods rely…”
Get full text
Conference Proceeding -
8
Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Directed grey-box fuzzing (DGF) is a security testing technique that aims to steer the fuzzer towards predefined target sites in the program. To gain…”
Get full text
Conference Proceeding -
9
Ponziguard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)
ISSN: 1558-1225Published: ACM 14.04.2024Published in Proceedings / International Conference on Software Engineering (14.04.2024)“…Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent years, causing massive financial losses. Rule-based detection…”
Get full text
Conference Proceeding -
10
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Source code authorship attribution is an important problem often encountered in applications such as software forensics, bug fixing, and software quality…”
Get full text
Conference Proceeding -
11
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…The detection of vulnerabilities in smart contracts remains a significant challenge. While numerous tools are available for analyzing smart contracts in source…”
Get full text
Conference Proceeding -
12
Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…Coverage-guided fuzzing is one of the most popular software testing techniques for vulnerability detection. While effective, current fuzzing methods suffer…”
Get full text
Conference Proceeding -
13
ReMoS: Reducing Defect Inheritance in Transfer Learning via Relevant Model Slicing
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Transfer learning is a popular software reuse technique in the deep learning community that enables developers to build custom mod-els (students) based on…”
Get full text
Conference Proceeding -
14
RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Warning: Please note that this article contains potential harmful or offensive content. This content is only for the evaluating and analysis of LLMs and does…”
Get full text
Conference Proceeding -
15
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference
ISSN: 1558-1225Published: ACM 01.10.2020Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01.10.2020)“…Grey-box fuzzing is an evolutionary process, which maintains and evolves a population of test cases with the help of a fitness function. Fitness functions used…”
Get full text
Conference Proceeding -
16
S-gram: Towards Semantic-Aware Security Auditing for Ethereum Smart Contracts
ISSN: 2643-1572Published: ACM 01.09.2018Published in 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2018)“…Smart contracts, as a promising and powerful application on the Ethereum blockchain, have been growing rapidly in the past few years. Since they are highly…”
Get full text
Conference Proceeding -
17
Towards More Practical Automation of Vulnerability Assessment
ISSN: 1558-1225Published: ACM 14.04.2024Published in Proceedings / International Conference on Software Engineering (14.04.2024)“…It is increasingly suggested to identify emerging software vulner-abilities (SVs) through relevant development activities (e.g., issue reports) to allow early…”
Get full text
Conference Proceeding -
18
Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Smart contracts, self-executing agreements directly encoded in code, are fundamental to blockchain technology, especially in decentralized finance (DeFi) and…”
Get full text
Conference Proceeding -
19
VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses
ISSN: 1558-1225Published: ACM 14.04.2024Published in Proceedings / International Conference on Software Engineering (14.04.2024)“…Accompanying the successes of learning-based defensive software vulnerability analyses is the lack of large and quality sets of labeled vulnerable program…”
Get full text
Conference Proceeding -
20
PrettySmart: Detecting Permission Re-Delegation Vulnerability for Token Behaviors in Smart Contracts
ISSN: 1558-1225Published: ACM 14.04.2024Published in Proceedings / International Conference on Software Engineering (14.04.2024)“…As an essential component in Ethereum and other blockchains, token assets have been interacted with by diverse smart contracts. Effective permission policies…”
Get full text
Conference Proceeding

