Picture for M. Ali Babar

M. Ali Babar

University of Adelaide, CREST - The Centre for Research on Engineering Software Technologies

Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++

Add code
Aug 03, 2024
Figure 1 for Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++
Figure 2 for Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++
Figure 3 for Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++
Figure 4 for Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++
Viaarxiv icon

A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality

Add code
Aug 01, 2024
Viaarxiv icon

Automatic Data Labeling for Software Vulnerability Prediction Models: How Far Are We?

Add code
Jul 25, 2024
Viaarxiv icon

Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help?

Add code
Jul 15, 2024
Viaarxiv icon

Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT

Add code
Apr 26, 2024
Viaarxiv icon

Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

Add code
Jan 20, 2024
Viaarxiv icon

METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities

Add code
Dec 11, 2023
Viaarxiv icon

Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)

Add code
Jul 03, 2023
Viaarxiv icon

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

Add code
Mar 16, 2022
Figure 1 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Figure 2 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Figure 3 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Figure 4 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Viaarxiv icon

Automated Security Assessment for the Internet of Things

Add code
Sep 09, 2021
Figure 1 for Automated Security Assessment for the Internet of Things
Figure 2 for Automated Security Assessment for the Internet of Things
Figure 3 for Automated Security Assessment for the Internet of Things
Figure 4 for Automated Security Assessment for the Internet of Things
Viaarxiv icon