no code implementations • ACL (NLP4Prog) 2021 • Vikram Nitin, Anthony Saieva, Baishakhi Ray, Gail Kaiser
Decompiling binary executables to high-level code is an important step in reverse engineering scenarios, such as malware analysis and legacy code maintenance.
no code implementations • 30 Oct 2023 • Shuo Liu, Gail Kaiser
Vulnerability identification is crucial to protect software systems from attacks for cyber-security.
1 code implementation • 21 Oct 2023 • Marcus J. Min, Yangruibo Ding, Luca Buratti, Saurabh Pujar, Gail Kaiser, Suman Jana, Baishakhi Ray
In this paper, we first formally define the self-consistency of Code LLMs and then design a framework, IdentityChain, which effectively and efficiently evaluates the self-consistency and general accuracy of a model at the same time.
1 code implementation • 5 May 2023 • Anthony Saieva, Saikat Chakraborty, Gail Kaiser
This paper introduces a novel code-to-code search technique that enhances the performance of Large Language Models (LLMs) by including both static and dynamic features as well as utilizing both similar and dissimilar examples during training.
1 code implementation • 20 Dec 2021 • Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail Kaiser, Baishakhi Ray
Automatically locating vulnerable statements in source code is crucial to assure software security and alleviate developers' debugging efforts.
1 code implementation • 13 Sep 2021 • Ziyuan Zhong, Gail Kaiser, Baishakhi Ray
Self-driving cars and trucks, autonomous vehicles (AVs), should not be accepted by regulatory bodies and the public until they have much higher confidence in their safety and reliability -- which can most practically and convincingly be achieved by testing.
1 code implementation • 20 May 2019 • Yuchi Tian, Ziyuan Zhong, Vicente Ordonez, Gail Kaiser, Baishakhi Ray
We found that many of the reported erroneous cases in popular DNN image classifiers occur because the trained models confuse one class with another or show biases towards some classes over others.
no code implementations • 8 Aug 2018 • Md Masudur Rahman, Saikat Chakraborty, Gail Kaiser, Baishakhi Ray
In particular, we analyze two previously proposed tools for project recommendation and bug localization tasks, which leverage diverse software artifacts, and observe that an informed choice of similarity measure indeed leads to improved performance of the existing SE tools.
1 code implementation • 6 Jun 2018 • Fang-Hsiang Su, Jonathan Bell, Gail Kaiser, Baishakhi Ray
It is challenging to search for executables relevant to an obfuscated application for developers to analyze efficiently.
Software Engineering Cryptography and Security