Skip to main content

Showing 1–4 of 4 results for author: Gyimóthy, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07213  [pdf, other

    cs.CR cs.SE

    Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions

    Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy

    Abstract: The rapid rise of cyber-crime activities and the growing number of devices threatened by them place software security issues in the spotlight. As around 90% of all attacks exploit known types of security issues, finding vulnerable components and applying existing mitigation techniques is a viable practical approach for fighting against cyber-crime. In this paper, we investigate how the state-of-th… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  2. arXiv:2405.07206  [pdf, other

    cs.SE

    Static JavaScript Call Graphs: A Comparative Study

    Authors: Gábor Antal, Péter Hegedűs, Zoltán Tóth, Rudolf Ferenc, Tibor Gyimóthy

    Abstract: The popularity and wide adoption of JavaScript both at the client and server side makes its code analysis more important than ever before. Most of the algorithms for vulnerability analysis, coding issue detection, or type inference rely on the call graph representation of the underlying program. Despite some obvious advantages of dynamic analysis, static algorithms should also be considered for ca… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  3. An Automatically Created Novel Bug Dataset and its Validation in Bug Prediction

    Authors: Rudolf Ferenc, Péter Gyimesi, Gábor Gyimesi, Zoltán Tóth, Tibor Gyimóthy

    Abstract: Bugs are inescapable during software development due to frequent code changes, tight deadlines, etc.; therefore, it is important to have tools to find these errors. One way of performing bug identification is to analyze the characteristics of buggy source code elements from the past and predict the present ones based on the same characteristics, using e.g. machine learning models. To support model… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

  4. arXiv:cs/0012014  [pdf, ps, other

    cs.SE

    Slicing of Constraint Logic Programs

    Authors: Gyongyi Szilagyi, Tibor Gyimothy, Jan Maluszynski

    Abstract: Slicing is a program analysis technique originally developed for imperative languages. It facilitates understanding of data flow and debugging. This paper discusses slicing of Constraint Logic Programs. Constraint Logic Programming (CLP) is an emerging software technology with a growing number of applications. Data flow in constraint programs is not explicit, and for this reason the concepts o… ▽ More

    Submitted 18 December, 2000; originally announced December 2000.

    Comments: In M. Ducasse (ed), proceedings of the Fourth International Workshop on Automated Debugging (AADEBUG 2000), August 2000, Munich. cs.SE/0010035

    ACM Class: D.2.5