Write a Blog >>
ESEC/FSE 2021
Thu 19 - Sat 28 August 2021 Clowdr Platform
Thu 26 Aug 2021 19:25 - 19:30 - Dependability—Vulnerabilities 2 Chair(s): Domenico Bianculli
Fri 27 Aug 2021 07:25 - 07:30 - Dependability—Vulnerabilities 2 Chair(s): Ramy Shahin

Examining the characteristics of software vulnerabilities and the code that contains them can lead to the development of more secure software. We present a dataset (~1.4 GB) containing vulnerable source code files together with the corresponding, patched versions. Contrary to other existing vulnerability datasets, ours includes vulnerable files written in more than 40 programming languages. Each file is associated to (1) a Common Vulnerability Exposures identifier (CVE ID) and (2) the repository it came from. Further, our dataset can be the basis for machine learning applications that identify defects, as we show in specific examples. We also present a supporting dataset that contains commit messages derived from Git commits that serve as security patches. This dataset can be used to train ML models that in turn,
can be used to detect security patch commits as we highlight in a specific use case.

Thu 26 Aug

Displayed time zone: Athens change

19:00 - 20:00
Dependability—Vulnerabilities 2Research Papers / Demonstrations +12h
Chair(s): Domenico Bianculli University of Luxembourg
19:00
10m
Paper
Identifying Casualty Changes in Software Patches
Research Papers
Adriana Sejfia University of Southern California, Yixue Zhao University of Massachusetts at Amherst, Nenad Medvidović University of Southern California
DOI Media Attached
19:10
10m
Paper
ACHyb: A Hybrid Analysis Approach to Detect Kernel Access Control VulnerabilitiesArtifacts AvailableArtifacts Reusable
Research Papers
Yang Hu The University of Texas at Austin, Wenxi Wang University of Texas at Austin, Casen Hunger University of Texas at Austin, Riley Wood University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin, Mohit Tiwari University of Texas at Austin
DOI
19:20
5m
Paper
ICME: An Informed Consent Management Engine for Conformance in Smart Building Environments
Demonstrations
Chehara Pathmabandu Monash University, John Grundy Monash University, Mohan Baruwal Chhetri CSIRO’s Data61, Zubair Baig Deakin University
DOI Media Attached
19:25
5m
Paper
CrossVul: A Cross-Language Vulnerability Dataset with Commit Data
Demonstrations
Georgios Nikitopoulos University of Thessaly, Konstantina Dritsa Athens University of Economics and Business, Panos Louridas Athens University of Economics and Business, Dimitris Mitropoulos University of Athens
DOI
19:30
30m
Live Q&A
Q&A (Dependability—Vulnerabilities 2)
Research Papers

Fri 27 Aug

Displayed time zone: Athens change

07:00 - 08:00
Dependability—Vulnerabilities 2Demonstrations / Research Papers
Chair(s): Ramy Shahin University of Toronto
07:00
10m
Paper
Identifying Casualty Changes in Software Patches
Research Papers
Adriana Sejfia University of Southern California, Yixue Zhao University of Massachusetts at Amherst, Nenad Medvidović University of Southern California
DOI Media Attached
07:10
10m
Paper
ACHyb: A Hybrid Analysis Approach to Detect Kernel Access Control VulnerabilitiesArtifacts AvailableArtifacts Reusable
Research Papers
Yang Hu The University of Texas at Austin, Wenxi Wang University of Texas at Austin, Casen Hunger University of Texas at Austin, Riley Wood University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin, Mohit Tiwari University of Texas at Austin
DOI
07:20
5m
Paper
ICME: An Informed Consent Management Engine for Conformance in Smart Building Environments
Demonstrations
Chehara Pathmabandu Monash University, John Grundy Monash University, Mohan Baruwal Chhetri CSIRO’s Data61, Zubair Baig Deakin University
DOI Media Attached
07:25
5m
Paper
CrossVul: A Cross-Language Vulnerability Dataset with Commit Data
Demonstrations
Georgios Nikitopoulos University of Thessaly, Konstantina Dritsa Athens University of Economics and Business, Panos Louridas Athens University of Economics and Business, Dimitris Mitropoulos University of Athens
DOI
07:30
30m
Live Q&A
Q&A (Dependability—Vulnerabilities 2)
Research Papers