Skip to main content

Showing 1–9 of 9 results for author: Suneja, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.19124  [pdf, other

    cs.CL

    Accelerating Production LLMs with Combined Token/Embedding Speculators

    Authors: Davis Wertheimer, Joshua Rosenkranz, Thomas Parnell, Sahil Suneja, Pavithra Ranganathan, Raghu Ganti, Mudhakar Srivatsa

    Abstract: This technical report describes the design and training of novel speculative decoding draft models, for accelerating the inference speeds of large language models in a production environment. By conditioning draft predictions on both context vectors and sampled tokens, we can train our speculators to efficiently predict high-quality n-grams, which the base model then accepts or rejects. This allow… ▽ More

    Submitted 6 June, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

    Comments: Original upload 4/29/24, updated 6/6/24 with additional references to concurrent work

  2. arXiv:2305.02783  [pdf, ps, other

    cs.SE cs.AI cs.CL cs.PL

    Automated Code generation for Information Technology Tasks in YAML through Large Language Models

    Authors: Saurabh Pujar, Luca Buratti, Xiaojie Guo, Nicolas Dupuis, Burn Lewis, Sahil Suneja, Atin Sood, Ganesh Nalawade, Matthew Jones, Alessandro Morari, Ruchir Puri

    Abstract: The recent improvement in code generation capabilities due to the use of large language models has mainly benefited general purpose programming languages. Domain specific languages, such as the ones used for IT Automation, have received far less attention, despite involving many active developers and being an essential component of modern cloud platforms. This work focuses on the generation of Ans… ▽ More

    Submitted 23 May, 2023; v1 submitted 2 May, 2023; originally announced May 2023.

  3. Study of Distractors in Neural Models of Code

    Authors: Md Rafiqul Islam Rabin, Aftab Hussain, Sahil Suneja, Mohammad Amin Alipour

    Abstract: Finding important features that contribute to the prediction of neural models is an active area of research in explainable AI. Neural models are opaque and finding such features sheds light on a better understanding of their predictions. In contrast, in this work, we present an inverse perspective of distractor features: features that cast doubt about the prediction by affecting the model's confid… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, Co-located with ICSE (InteNSE'23)

  4. arXiv:2112.10893  [pdf, other

    cs.SE cs.LG

    VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

    Authors: Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail Kaiser, Baishakhi Ray

    Abstract: Automatically locating vulnerable statements in source code is crucial to assure software security and alleviate developers' debugging efforts. This becomes even more important in today's software ecosystem, where vulnerable code can flow easily and unwittingly within and across software repositories like GitHub. Across such millions of lines of code, traditional static and dynamic approaches stru… ▽ More

    Submitted 12 January, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

    Comments: Camera Ready for Research Track of 29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2022)

  5. arXiv:2111.05827  [pdf

    cs.SE cs.AI

    Data-Driven AI Model Signal-Awareness Enhancement and Introspection

    Authors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari

    Abstract: AI modeling for source code understanding tasks has been making significant progress, and is being adopted in production development pipelines. However, reliability concerns, especially whether the models are actually learning task-related aspects of source code, are being raised. While recent model-probing approaches have observed a lack of signal awareness in many AI-for-code models, i.e. models… ▽ More

    Submitted 7 January, 2022; v1 submitted 10 November, 2021; originally announced November 2021.

    Comments: Fixed author email ids

  6. arXiv:2109.03341  [pdf

    cs.AI cs.SE

    Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation

    Authors: Yufan Zhuang, Sahil Suneja, Veronika Thost, Giacomo Domeniconi, Alessandro Morari, Jim Laredo

    Abstract: Identifying vulnerable code is a precautionary measure to counter software security breaches. Tedious expert effort has been spent to build static analyzers, yet insecure patterns are barely fully enumerated. This work explores a deep learning approach to automatically learn the insecure patterns from code corpora. Because code naturally admits graph structures with parsing, we develop a novel gra… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: Submitted June 2020

  7. arXiv:2011.14934  [pdf

    cs.SE cs.AI cs.LG

    Probing Model Signal-Awareness via Prediction-Preserving Input Minimization

    Authors: Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari

    Abstract: This work explores the signal awareness of AI models for source code understanding. Using a software vulnerability detection use case, we evaluate the models' ability to capture the correct vulnerability signals to produce their predictions. Our prediction-preserving input minimization (P2IM) approach systematically reduces the original source code to a minimal snippet which a model needs to maint… ▽ More

    Submitted 22 June, 2021; v1 submitted 25 November, 2020; originally announced November 2020.

    Comments: Authors Sahil Suneja, Yunhui Zheng, and Yufan Zhuang contributed equally to this research. FSE 2021

  8. arXiv:2006.08614  [pdf

    cs.SE cs.CR cs.LG cs.PL

    Learning to map source code to software vulnerability using code-as-a-graph

    Authors: Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari

    Abstract: We explore the applicability of Graph Neural Networks in learning the nuances of source code from a security perspective. Specifically, whether signatures of vulnerabilities in source code can be learned from its graph representation, in terms of relationships between nodes and edges. We create a pipeline we call AI4VA, which first encodes a sample source code into a Code Property Graph. The extra… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

  9. arXiv:1905.08192  [pdf

    cs.CR cs.OS cs.SE

    Secure Extensibility for System State Extraction via Plugin Sandboxing

    Authors: Sahil Suneja, Canturk Isci

    Abstract: We introduce a new mechanism to securely extend systems data collection software with potentially untrusted third-party code. Unlike existing tools which run extension modules or plugins directly inside the monitored endpoint (the guest), we run plugins inside a specially crafted sandbox, so as to protect the guest as well as the software core. To get the right mix of accessibility and constraints… ▽ More

    Submitted 20 May, 2019; originally announced May 2019.