1 code implementation • 20 Dec 2021 • Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail Kaiser, Baishakhi Ray
Automatically locating vulnerable statements in source code is crucial to assure software security and alleviate developers' debugging efforts.
no code implementations • 10 Nov 2021 • Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari
AI modeling for source code understanding tasks has been making significant progress, and is being adopted in production development pipelines.
no code implementations • 7 Sep 2021 • Yufan Zhuang, Sahil Suneja, Veronika Thost, Giacomo Domeniconi, Alessandro Morari, Jim Laredo
Identifying vulnerable code is a precautionary measure to counter software security breaches.
1 code implementation • 16 Feb 2021 • Yunhui Zheng, Saurabh Pujar, Burn Lewis, Luca Buratti, Edward Epstein, Bo Yang, Jim Laredo, Alessandro Morari, Zhong Su
However, existing datasets to train models for vulnerability identification suffer from multiple limitations such as limited bug context, limited size, and synthetic and unrealistic source code.
no code implementations • 25 Nov 2020 • Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari
We measure the signal awareness of models using a new metric we propose- Signal-aware Recall (SAR).
no code implementations • 22 Jun 2020 • Luca Buratti, Saurabh Pujar, Mihaela Bornea, Scott McCarley, Yunhui Zheng, Gaetano Rossiello, Alessandro Morari, Jim Laredo, Veronika Thost, Yufan Zhuang, Giacomo Domeniconi
We explore this hypothesis through the use of a pre-trained transformer-based language model to perform code analysis tasks.
no code implementations • 15 Jun 2020 • Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari
We explore the applicability of Graph Neural Networks in learning the nuances of source code from a security perspective.