Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Software is a crucial component in the communication systems, and its security is of paramount importance. However, it is susceptible to different types of attacks due to potential vulnerabilities. Meanwhile, significant time and effort is required to fix such vulnerabilities. We propose an automated program repair method based on controlled text generation techniques. Specifically, we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process, selecting results that contribute most to vulnerability fixes. Additionally, we perform static syntax analysis to expedite the patch verification process. The effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets, demonstrating significant improvements in generating correct patches compared to other existing methods.
Y. Xiao, H. H. Chen, X. Du, and M. Guizani, Stream-based cipher feedback mode in wireless error channel, IEEE Trans. Wirel. Commun., vol. 8, no. 2, pp. 622–626, 2009.
M. T. Baldassarre, V. S. Barletta, D. Caivano, and M. Scalera, Integrating security and privacy in software development, Softw. Qual. J., vol. 28, no. 3, pp. 987–1018, 2020.
J. Xu, M. Li, Z. He, and T. Anwlnkom, Security and privacy protection communication protocol for Internet of vehicles in smart cities, Comput. Electr. Eng., vol. 109, p. 108778, 2023.
A. Romdhana, A. Merlo, M. Ceccato, and P. Tonella, Assessing the security of inter-app communications in android through reinforcement learning, Comput. Secur., vol. 131, p. 103311, 2023.
Y. Xiao, Q. Du, W. Cheng, and N. Lu, Secure communication guarantees for diverse extended-reality applications: A unified statistical security model, IEEE J. Sel. Top. Signal Process., vol. 17, no. 5, pp. 1007–1021, 2023.
Z. Shen and S. Chen, A survey of automatic software vulnerability detection, program repair, and defect prediction techniques, Secur. Commun. Netw., vol. 2020, no. 1, p. 8858010, 2020.
M. Mahanty, B. Vamsi, and D. Madhavi, A corpus-based auto-encoder-and-decoder machine translation using deep neural network for translation from English to Telugu language, SN Comput. Sci., vol. 4, no. 4, p. 354, 2023.
X. Du and D. Wu, Adaptive cell relay routing protocol for mobile ad hoc networks, IEEE Trans. Veh. Technol., vol. 55, no. 1, pp. 278–285, 2006.
X. Du and Y. Xiao, Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks, Int. J. Wirel. Mob. Comput., vol. 1, no. 2, p. 121, 2006.
X. Gao, B. Wang, G. J. Duck, R. Ji, Y. Xiong, and A. Roychoudhury, Beyond tests: Program vulnerability repair via crash constraint extraction, ACM Trans. Softw. Eng. Methodol., vol. 30, no. 2, p. 14, 2021.
M. Tufano, C. Watson, G. Bavota, M. Di Penta, M. White, and D. Poshyvanyk, An empirical study on learning bug-fixing patches in the wild via neural machine translation, ACM Trans. Softw. Eng. Methodol., vol. 28, no. 4, p. 19, 2019.
C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer, GenProg: A generic method for automatic software repair, IEEE Trans. Softw. Eng., vol. 38, no. 1, pp. 54–72, 2012.
J. Xuan, M. Martinez, F. DeMarco, M. Clément, S. L. Marcote, T. Durieux, D. Le Berre, and M. Monperrus, Nopol: automatic repair of conditional statement bugs in Java programs, IEEE Trans. Softw. Eng., vol. 43, no. 1, pp. 34–55, 2017.
S. Chakraborty, Y. Ding, M. Allamanis, and B. Ray, CODIT: code editing with tree-based neural models, IEEE Trans. Softw. Eng., vol. 48, no. 4, pp. 1385–1399, 2022.
This work is available under the CC BY-NC-ND 3.0 IGO license:https://creativecommons.org/licenses/by-nc-nd/3.0/igo/